Preface
Security researchers are warning of previously undisclosed flaws in fully patched Microsoft Exchange servers being exploited by malicious actors in real-world attacks to achieve remote code execution on affected systems.
The advisory comes from Vietnamese cybersecurity company GTSC, which discovered the shortcomings as part of its security monitoring and incident response efforts in August 2022.
The two vulnerabilities, which are formally yet to be assigned CVE identifiers, are being tracked by the Zero Day Initiative as ZDI-CAN-18333 (CVSS score: 8.8) and ZDI-CAN-18802 (CVSS score: 6.3).
GTSC said that successful exploitation of the flaws could be abused to gain a foothold in the victim's systems, enabling adversaries to drop web shells and carry out lateral movements across the compromised network.
The workaround
- Open the IIS Manager
- Expand the Default Web Site
- Select Autodiscover
- In the Feature View, click URL Rewrite
- In the Actions pane on the right-hand side, click Add Rules
- Select Request Blocking and click OK
- Add String ".*autodiscover\.json.*\@.*Powershell.*" (excluding quotes) and click OK
- Expand the rule and select the rule with the Pattern ".*autodiscover\.json.*\@.*Powershell.*" and click Edit under Conditions
- Change the condition input from {URL} to {REQUEST_URI}
The issue I found
This is great but URL rewrite is not installed by default with Exchange, its an add-on to get this addin from here: https://www.iis.net/downloads/microsoft/url-rewrite
Once you have the download called "urlrerwite2.exe" this will run the Microsoft Web Platforms installer for you
This is the workaround with images
WARNING : This will take IIS offline so ensure you have contingency for this, is you have database copies and DAG you will be fine.
This is what I did as below....run the install...
Then the install will run:
Once complete you will get the all good:
Then on the right hand side under features and IIS choose "URL Rewrite" as shown below: