Zero Day Initiative - Exploiting Exchange PowerShell After ProxyNotShell: Part 3 - DLL Loading Chain for RCE
Briefly

The chain of three vulnerabilities, namely CVE-2023-36744, CVE-2023-36777, and CVE-2023-36745, illustrates how they collectively enable remote code execution in Microsoft Exchange.
CVE-2023-36745 demonstrated an intriguing use of a single-argument constructor in a specific Exchange class to load a DLL from an attacker-controlled location, thus highlighting potential for privilege escalation.
The methodical presentation of the vulnerabilities reveals a comprehensive thought process in chaining them together, emphasizing the technical depth and strategic considerations involved in the exploitation.
The talk at OffensiveCon serves not only as an informative session but also as an important resource for understanding the intricacies of exploiting Microsoft Exchange PowerShell Remoting.
Read at Zero Day Initiative
[
|
]