关联漏洞
描述
Just another PoC for the new MSDT-Exploit
介绍
# CVE-2022-30190-follina
Just another PoC for the new MSDT-Exploit
To edit the Doc, just open with 7z, xarchiver, ... to change the value in word\rels\document.xml.rels to your IP.
The exploit must contain at least 3541 characters <b>before</b> the window.location.href, and they must be within the script tag. Now there are about 9000, just to be sure.
More about the exploit:
https://www.borncity.com/blog/2022/06/01/follina-schwachstelle-cve-2022-30190-warnungen-erste-angriffe-der-status/ (german)
<br>
https://packetstormsecurity.com/files/167317/msdt-poc.txt
Mitigation and workaround:
https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/
Windows Defender already knows that this is a security flaw (Trojan:Win32/Mesdetty.D), so you have to edit the file, in case you get busted.
REMEMBER: ONLY FOR EDUCATIONAL PURPOSES!!! ;)
## To-Do:
- Obfuscation
- Invoke PS Script
文件快照
[4.0K] /data/pocs/ad89f41d8f8d35163b92194fe7c6a1c6432f4872
├── [8.1K] bad.html
├── [9.9K] click_to_exploit.docx
├── [1.2K] exploit_oneline.md
└── [ 955] README.md
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。