{"uuid": "76eeb206-8a25-4dba-b4b6-caa12e6141b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21707", "type": "published-proof-of-concept", "source": "https://t.me/road_to_oscp/199", "content": "Microsoft Exchange Powershell Remoting Deserialization leading to RCE (CVE-2023-21707) \n\n\ud83d\udc64 by testanull\n\nWhile analyzing CVE-2022-41082, also known as Proxy Not Shell, researcher discovered CVE-2023-21707 vulnerability which he has detailed in this blog.\nThe vulnerability allows a privileged user to trigger RCE during a deserialization of untrusted data.\n\n\ud83d\udcdd Contents:\n\u25cf Introduction \n\u25cf The new variant\n\u25cf Payload delivery\n\u25cf Demo\n\u25cf References\n\nhttps://starlabs.sg/blog/2023/04-microsoft-exchange-powershell-remoting-deserialization-leading-to-rce-cve-2023-21707/", "creation_timestamp": "2023-04-28T13:05:15.000000Z"}