enardeitjaptrues

Last year, two high severity, easily exploitable Microsoft Exchange vulnerabilities dubbed ProxyLogon and ProxyShell made waves in the infosec sphere. Nearly a year later, Exchange Server admins are met with another threat: ProxyNotShell, which in fact is a vulnerability chain comprising two actively exploited flaws:

  • CVE-2022-41040 is a server-side request forgery (SSRF) vulnerability that an authenticated attacker can exploit for privilege escalation. This vulnerability occurs because the root cause of ProxyShell’s path confusion flaw remains, as explained further below.
  • CVE-2022-41082 is a deserialization flaw that can be abused to achieve remote code execution (RCE) in Exchange’s PowerShell backend once it becomes accessible to the attacker. 

Both vulnerabilities impact Microsoft Exchange Server on-premises and hybrid setups running Exchange versions 2013, 2016, and 2019 with an internet-exposed Outlook Web App (OWA) component.

Although an attacker must be authenticated prior to exploiting these flaws, the low degree of complexity required for exploitation, and the potentially damaging impact to confidentiality, availability, and integrity of systems, are reasons for these vulnerabilities to be rated high in severity. In fact, earlier reports suggested that threat actors had leveraged this zero-day vulnerability chain to deploy China Chopper web shells on hacked servers to obtain persistent access and steal sensitive data.

In an ideal ProxyNotShell attack scenario, an authenticated attacker would first exploit the SSRF vulnerability to gain access to Exchange's PowerShell backend. By then exploiting CVE-2022-41082, they would be able to remotely execute code on a vulnerable Exchange server.

At the time of writing, more than 197,000 unpatched, exposed Exchange Outlook Web App (OWA) servers were on the internet, according to the Shodan.io report below, making the attack surface for Exchange vulnerabilities widespread.

sharma proxynotshell 1Ax Sharma

An actively exploited zero-day with insufficient mitigations

In early August, Vietnamese cybersecurity incident response and SOC firm GTSC observed the exploitation of a critical system running Exchange Server in one of its client environments. Upon investigation, GTSC determined that the exploit involved a Microsoft Exchange payload. In particular, the payload spotted by the firm’s SOC analysts in IIS server logs was in the format:

autodiscover/autodiscover.json?@evil.com/<Exchange-backend-endpoint>&Email=autodiscover/autodiscover.json%3f@evil.com

Interestingly, attack payload for exploiting the previously discovered ProxyShell vulnerability also comprises an identical string, i.e. “.../autodiscover/autodiscover.json.” To the analysts’ surprise, however, the hijacked Exchange Server in question had been running a version that’s patched against ProxyShell, making this attack unlikely to be connected to ProxyShell. Upon further investigation, the analysts deemed this attack resulting from a separate zero-day vulnerability, which was later named ProxyNotShell.