{"uuid": "6212e805-ff2e-4ea4-9bdf-06f97b7ffb87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-41076", "type": "published-proof-of-concept", "source": "https://t.me/professional_c_h/1888", "content": "\u2b55\ufe0fMicrosoft Exchange: OWASSRF + TabShell \n(CVE-2022-41076)\n\nThe TabShell vulnerability its a form of Privilege Escalation which allows breaking out of the restricted Powershell Sandbox after you have successfully gained access through OWASSRF.\n\nFor a detailed write see research: \nhttps://blog.viettelcybersecurity.com/tabshell-owassrf/\n\nPoC: \nhttps://gist.github.com/testanull/518871a2e2057caa2bc9c6ae6634103e\n\n#owa #ssrf #tabshell #poc\n\nChannels :\n@Professional_c_h\n@Card_Crack_Hack", "creation_timestamp": "2023-01-28T21:44:02.000000Z"}