关键信息 Edb-ID: 42711 CVE: 2017-8759 Author: VoulNet Type: Remote Platform: Windows Date: 2017-09-13 Vulnerable App: Microsoft Windows .NET Framework 漏洞描述 Source: https://github.com/Voulnet/CVE-2017-8759-Exploit-sample Description: - A Word macro in a Doc1.doc file downloads a badly formatted txt file over wsdl, triggering a WSDL parser log. - This leads to the execution of mshta.exe, which runs PowerShell commands that eventually execute mspaint.exe. Testing Instructions: - Serve the exploit.txt and cmd.hta files using a webserver on port 8000. - Successful exploitation results in mspaint.exe running. Proof of Concept Link: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42711.zip