PR
CVE 2018 8581 template
projectdiscovery/nuclei-templates#14759

PR Information

/claim #14576

Template validation

  • Validated with a host running a vulnerable version and/or configuration (True Positive)
  • Validated with a host running a patched version and/or configuration (avoid False Positive)

Additional Details (leave it blank if not applicable)

Template Detection Method:

  • Uses EWS PushSubscription SOAP API to trigger SSRF
  • Validates vulnerability via OOB (out-of-band) HTTP interaction using interactsh
  • Requires authentication (username/password variables)
  • Not relying solely on version-based detection - proves exploitability

Shodan Query: cpe:"cpe:2.3:a:microsoft:exchange_server"

FOFA Query: app="Microsoft-Exchange"

Testing Command:

nuclei -t http/cves/2018/CVE-2018-8581.yaml -target [https://exchange.example.com](https://exchange.example.com) -var username=user@domain.com -var password=P@ssw0rd -debug
### Additional References:
- [Nuclei Template Creation Guideline](https://docs.projectdiscovery.io/templates/introduction)
- [Nuclei Template Matcher Guideline](https://github.com/projectdiscovery/nuclei-templates/wiki/Unique-Template-Matchers)
- [Nuclei Template Contribution Guideline](https://github.com/projectdiscovery/nuclei-templates/blob/master/CONTRIBUTING.md)
- [PD-Community Discord server](https://discord.gg/projectdiscovery)

Claim

Total prize pool $100
Total paid $0
Status Pending
Submitted January 08, 2026
Last updated January 08, 2026

Contributors

DI

Dipak Kumar

@dkrray772-gmail-com

100%

Sponsors

PR

ProjectDiscovery

@projectdiscovery

$100