关联漏洞
描述
Follina MS-MSDT 0-day MS Office RCE (CVE-2022-30190) PoC in Go
介绍
```console
$ gollina -h
gollina
Follina MS-MSDT 0-day MS Office RCE PoC in Go
--
@dwisiswant0
Usage:
gollina -c [COMMAND] [OPTIONS...]
Options:
-h, --host Listener host (default: 0.0.0.0)
-p, --port Listener port (default: 8090)
-n, --name Word file name (w/o extension, default: gollina)
-c, --command Arbitrary command to execute
Examples:
gollina -c "cmd.exe /c calc.exe"
gollina -c "cmd.exe /c calc.exe" -p 8080
```
<hr></hr>
<h6 align="center"><small>DISCLAIMER</small></h6>
<h6 align="center"><sub>Usage of this program without prior mutual consent can be considered as an illegal activity. It is the final user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.
</sub></h6>
文件快照
[4.0K] /data/pocs/47a722946cff72eef03406f309489810ad4e797f
├── [ 966] compile.go
├── [ 523] consts.go
├── [ 57] err.go
├── [ 173] go.mod
├── [1.2K] go.sum
├── [1.0K] LICENSE
├── [2.2K] main.go
├── [ 131] options.go
├── [ 857] README.md
├── [4.0K] res
│ ├── [4.0K] docx
│ │ ├── [2.3K] [Content_Types].xml
│ │ ├── [4.0K] docProps
│ │ │ ├── [ 746] app.xml
│ │ │ └── [ 750] core.xml
│ │ ├── [4.0K] _rels
│ │ └── [4.0K] word
│ │ ├── [4.0K] document.xml
│ │ ├── [1.4K] fontTable.xml
│ │ ├── [4.0K] _rels
│ │ │ └── [2.1K] document.xml.rels
│ │ ├── [2.6K] settings.xml
│ │ ├── [ 29K] styles.xml
│ │ ├── [4.0K] theme
│ │ │ └── [8.1K] theme1.xml
│ │ └── [ 586] webSettings.xml
│ └── [ 180] exploit.gohtml
├── [1.1K] serve.go
├── [1.5K] utils.go
└── [ 188] vars.go
7 directories, 23 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。