Jump to content
Nytro

Microsoft Word Local Machine Zone Remote Code Execution Vulnerability

Recommended Posts

Posted

[h=1]Microsoft Word Local Machine Zone Remote Code Execution Vulnerability[/h]

Exploit Title: Microsoft Word Local Machine Zone Remote Code Execution Vulnerability

Date: July 15th, 2015

Exploit Author: Eduardo Braun Prado

Vendor Homepage : Microsoft – Pagina de pornire oficial?

Version: 2007

Tested on: Microsoft Windows XP, 2003, Vista, 2008, 7, 8, 8.1

CVE: CVE-2015-0097

Original Advisory: https://technet.microsoft.com/library/security/ms15-022

Microsoft Word, Excel and Powerpoint 2007 contains a remote code execution vulnerability because it is possible

to reference documents such as Works document (.wps) as HTML. It will process HTML and script code in the context

of the local machine zone of Internet Explorer which leads to arbitrary code execution.

By persuading users into opening eg. specially crafted .WPS, ".doc ", ".RTF " (with a space at the end)

it is possible to triggerthe vulnerability and run arbitrary code in the context of the logged on Windows user.

Exploit code here :

https://onedrive.live.com/embed?cid=412A36B6D0A9436A&resid=412A36B6D0A9436A%21156&authkey=AA_JVoZcoM5kvOc

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/37657.zip

Sursa: https://www.exploit-db.com/exploits/37657/

  • Upvote 1
Posted

Chiar azi am intrat pe exploit-db si mi-au ajuns rapid ochii pe asta.

As fi aruncat o privire la exploit in sine, dar cand am vazut ca linkul de github duce la o arhiva, mi-a disparut cheful.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...