Skip to content

Commit

Permalink
Add more words about Exchange role groups
Browse files Browse the repository at this point in the history
  • Loading branch information
wvu committed Sep 16, 2020
1 parent adee1a7 commit e0e0ac2
Show file tree
Hide file tree
Showing 2 changed files with 12 additions and 0 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,12 @@ required to exploit this vulnerability. Additionally, the target user
must have the `Data Loss Prevention` role assigned and an active
mailbox.

If the user is in the `Compliance Management` or greater `Organization
Management` role groups, then they have the `Data Loss Prevention`
role. Since the user who installed Exchange is in the `Organization
Management` role group, they transitively have the `Data Loss
Prevention` role.

The specific flaw exists within the processing of the `New-DlpPolicy`
cmdlet. The issue results from the lack of proper validation of
user-supplied template data when creating a DLP policy. An attacker
Expand Down
6 changes: 6 additions & 0 deletions modules/exploits/windows/http/exchange_ecp_dlp_policy.rb
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,12 @@ def initialize(info = {})
must have the "Data Loss Prevention" role assigned and an active
mailbox.
If the user is in the "Compliance Management" or greater "Organization
Management" role groups, then they have the "Data Loss Prevention"
role. Since the user who installed Exchange is in the "Organization
Management" role group, they transitively have the "Data Loss
Prevention" role.
The specific flaw exists within the processing of the New-DlpPolicy
cmdlet. The issue results from the lack of proper validation of
user-supplied template data when creating a DLP policy. An attacker
Expand Down

0 comments on commit e0e0ac2

Please sign in to comment.