{"uuid": "34506efa-ad72-425a-9dc7-c8d1657a1af5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-41076", "type": "published-proof-of-concept", "source": "https://t.me/zero_day_uz/280", "content": "Microsoft Exchange: OWASSRF + TabShell \n(CVE-2022-41076)\n\nThe TabShell vulnerability its a form of Privilege Escalation which allows breaking out of the restricted Powershell Sandbox after you have successfully gained access through OWASSRF.\n\nFor a detailed write see research: \nhttps://blog.viettelcybersecurity.com/tabshell-owassrf/\n\nPoC: \nhttps://gist.github.com/testanull/518871a2e2057caa2bc9c6ae6634103e\n\n#owa #ssrf #tabshell #poc", "creation_timestamp": "2023-01-10T09:14:55.000000Z"}