# CVE-2020-17144 **Repository Path**: delete_user/CVE-2020-17144 ## Basic Information - **Project Name**: CVE-2020-17144 - **Description**: weaponized tool for CVE-2020-17144 - **Primary Language**: Unknown - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2021-01-24 - **Last Updated**: 2021-10-20 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README ## weaponized tool for CVE-2020-17144(Microsoft Exchange 2010 MRM.AutoTag.Model unsafe deserialize vulnerability) ### build install .net framework 3.5 first, then `make`. ### usage CVE-2020-17144 After exploit, access http://[target]/ews/soap/?pass=whoami to get command execution. ![](https://raw.githubusercontent.com/zcgonvh/CVE-2020-17144/master/exp.jpg) And you can also modify e.cs as a customize exp. for more information, read [my-blog-post](http://www.zcgonvh.com/post/analysis_of_CVE-2020-17144_and_to_weaponizing.html)(in chinese).