FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

Ransomware Hackers Using New Way to Bypass MS Exchange ProxyNotShell Mitigations

By: Ravie Lakshmanan β€” December 21st 2022 at 07:41
Threat actors affiliated with a ransomware strain known as Play are leveraging a never-before-seen exploit chain that bypasses blocking rules for ProxyNotShell flaws in Microsoft Exchange Server to achieve remote code execution (RCE) through Outlook Web Access (OWA). "The new exploit method bypassesΒ URL rewrite mitigationsΒ for theΒ Autodiscover endpoint," CrowdStrike researchers Brian Pitchford,
☐ β˜† βœ‡ The Hacker News

Mitigation for Exchange Zero-Days Bypassed! Microsoft Issues New Workarounds

By: Ravie Lakshmanan β€” October 5th 2022 at 05:31
Microsoft has updated its mitigation measures for the newly disclosed and actively exploited zero-day flaws in Exchange Server after it was found that they could be trivially bypassed. The two vulnerabilities, tracked as CVE-2022-41040 and CVE-2022-41082, have been codenamedΒ ProxyNotShellΒ due to similarities to another set of flaws calledΒ ProxyShell, which the tech giant resolved last year.
☐ β˜† βœ‡ The Hacker News

ProxyNotShell – the New Proxy Hell?

By: The Hacker News β€” October 4th 2022 at 08:05
Nicknamed ProxyNotShell, a new exploit used in the wild takes advantage of the recently published Microsoft Server-Side Request Forgery (SSRF) vulnerability CVE-2022-41040 and a second vulnerability, CVE-2022-41082 that allows Remote Code Execution (RCE) when PowerShell is available to unidentified attackers. Based on ProxyShell, this new zero-day abuse risk leverage a chained attack similar to
❌