From df110f880a1f0b282d002b873ccc4af968da6f5c Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=E4=B9=8B=E4=B9=8E=E8=80=85=E4=B9=9F?= Date: Fri, 7 Apr 2023 11:42:37 +0800 Subject: [PATCH] Create CVE-2021-26857\CVE-2021-26858.md --- "CVE-2021-26857\\CVE-2021-26858.md" | 12 ++++++++++++ 1 file changed, 12 insertions(+) create mode 100644 "CVE-2021-26857\\CVE-2021-26858.md" diff --git "a/CVE-2021-26857\\CVE-2021-26858.md" "b/CVE-2021-26857\\CVE-2021-26858.md" new file mode 100644 index 0000000..6335d98 --- /dev/null +++ "b/CVE-2021-26857\\CVE-2021-26858.md" @@ -0,0 +1,12 @@ +## Microsoft Exchange Server Remote Command Execution Vulnerability (CVE-2021-26857/CVE-2021-26858) + +| **Vulnerability** | **Microsoft Exchange Server Remote Command Execution Vulnerability (CVE-2021-26857/CVE-2021-26858)** | +| :----: | :-----| +| **Chinese name** | Microsoft Exchange Server 远程命令执行漏洞(CVE-2021-26857/CVE-2021-26858) | +| **CVSS core** | 7.8 | +| **FOFA Query** (click to view the results directly)| [banner="Microsoft ESMTP MAIL Service" \|\| banner="Microsoft Exchange Server" \|\| banner="Microsoft Exchange Internet Mail Service" \|\| banner="Microsoft SMTP MAIL" \|\| banner="Microsoft Exchange" \|\| (banner="owa" && banner="Location" && cert!="Technicolor") \|\| banner="Set-Cookie: OutlookSession" \|\| (((header="owa" && (header="Location" \|\| header="X-Owa-Version" \|\| header="Set-Cookie: OWA-COOKIE")) \|\| (body="href=\\\"/owa/auth/" && (title="Outlook" \|\| title="Exchange " \|\| body="var a_sLgn" \|\| body="aria-label=\\\"Outlook Web App\\\" class=\\\"signInImageHeader"))) && header!="WordPress" && body!="wp-content" && body!="wp-includes") \|\| body="\