Share
## https://sploitus.com/exploit?id=D5A83A35-A33D-5322-8A98-6B7F9D483034
# Forked Version (RCE Only)

Forked repository and removed the credential leak part. Applied fixes for compilation.

# CVE-2023-27532

Proof of Concept code to exploit CVE-2023-27532 and either leak plaintext credentials or perform remote command execution.

## Overview

For a detailed analysis of the vulnerability and exploitation please read the Rapid7 [AttackerKB Analysis](https://attackerkb.com/topics/ALUsuJioE5/cve-2023-27532/rapid7-analysis).

## Building

Open in Visual Studio. Since the Liberis `Veeam.Backup.Common.dll`, `Veeam.Backup.Interaction.MountService.dll`, and `Veeam.Backup.Model.dll` are included in the project, they do not need to be concerned about.

## Usage

Leak the plaintext credentials from the remote server.

```
> VeeamHax.exe --target 192.168.0.100
```

![VeeamHax1](VeeamHax1.png)

Run an arbitrary command with local system privileges on the remote server.

```
> VeeamHax.exe --target 192.168.0.100 --cmd calc.exe
```

![VeeamHax2](VeeamHax2.png)

![VeeamHax3](VeeamHax3.png)

## Credits

Previous research into this vulnerability was performed by:

 * [CODE WHITE GmbH](https://twitter.com/codewhitesec/status/1633948476353519616)
 * [Huntress](https://www.huntress.com/blog/veeam-backup-replication-cve-2023-27532-response)
 * [Y4er](https://y4er.com/posts/cve-2023-27532-veeam-backup-replication-leaked-credentials/)