关联漏洞
描述
An exploitation of CVE-2022-30190 (Follina)
介绍
# CVE-2022-30190
> Based on https://github.com/JohnHammond/msdt-follina
## Environment Setup
> Use files in /env-setup
1. Virtual Machine: use VirtualBox and [Win10_21H2_English_x32.iso](https://drive.google.com/file/d/1J2vBbrps2A3LL3XMexloBt70OdvI_vWn/view?usp=drive_link) (Build 19044.1288)
2. Install Microsoft Word, run `setup.exe /configure configuration.xml` using cmd inside /env-setup/odt-2013
3. Install Python 3.8.10
## Exploitation
1. Turn off Virus and Threat Scanning in Window's settings
2. Make sure you have all the Python packages needed
* Often need to install netifaces using `pip install netifaces`
3. Get your machine's IP address (`ipconfig`)
4. Run `py folina.py -i <ip-address>` (refer to the original repo for more details)
5. Open the malicious doc file. Then the msdt, sdiagnhost and a calcualtor should pop up
<img src="https://github.com/meowhua15/CVE-2022-30190/assets/74200918/b3dc2360-11f4-476e-b457-0f5108ef5172" width=40%> <img src="https://github.com/meowhua15/CVE-2022-30190/assets/74200918/e73ff6ae-727c-4c5f-a370-7c80790ff8d5" width=40%> <img src="https://github.com/meowhua15/CVE-2022-30190/assets/74200918/111b6e3e-b106-4a09-bd39-76ea6b8561bc" width=40%>
文件快照
[4.0K] /data/pocs/ca0796d5936546a7cc2539de77f72d9210ce7591
├── [4.8M] CVE-2022-30190-Report.pdf
├── [4.0K] doc
│ ├── [1.3K] [Content_Types].xml
│ ├── [4.0K] docProps
│ │ ├── [ 703] app.xml
│ │ └── [ 734] core.xml
│ ├── [4.0K] _rels
│ └── [4.0K] word
│ ├── [3.8K] document.xml
│ ├── [1.5K] fontTable.xml
│ ├── [4.0K] _rels
│ │ └── [ 974] document.xml.rels
│ ├── [2.9K] settings.xml
│ ├── [ 29K] styles.xml
│ ├── [4.0K] theme
│ │ └── [6.6K] theme1.xml
│ └── [ 802] webSettings.xml
├── [4.0K] env-setup
│ ├── [4.0K] odt-2013
│ │ ├── [ 307] configuration.xml
│ │ └── [1.1M] setup.exe
│ ├── [ 26M] python-3.8.10.exe
│ └── [4.0K] sysmon
│ ├── [7.2K] Eula.txt
│ ├── [4.6M] Sysmon64a.exe
│ ├── [4.2M] Sysmon64.exe
│ └── [7.8M] Sysmon.exe
├── [5.0K] follina.py
├── [4.0K] log
│ └── [ 68K] log.evtx
├── [ 44K] nc64.exe
└── [1.2K] README.md
10 directories, 22 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。