POC详情: 31adf5da1972fba6652233bb129777f91c581c57

来源
关联漏洞
标题: Microsoft Outlook 安全漏洞 (CVE-2024-21413)
描述:Microsoft Outlook是美国微软(Microsoft)公司的一套电子邮件应用程序。 Microsoft Outlook 存在安全漏洞。以下产品和版本受到影响:Microsoft Office 2019 for 32-bit editions,Microsoft Office 2019 for 64-bit editions,Microsoft 365 Apps for Enterprise for 32-bit Systems,Microsoft 365 Apps for Enterprise
介绍
# CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC

## 🚀 Usage

Ensure you have appropriate permissions and authorization from the target system owner before using this script.

### Prerequisites

- Python 3.x
- `impacket-smbserver` 

### Usage Example

```bash
sudo python3 CVE-2024-21413.py
```

## 🛠️ Features
- Email Sending: Utilizes SMTP to send an email with both plain text and HTML parts.
- HTML Templating: Supports reading HTML templates from the Templates folder and replacing 
placeholders with actual values.
- Attachment: Automatically creates and attaches an exploit.rtf file to the email.
- Impacket Integration: Optionally starts an Impacket SMB server to capture NTLM hashes for 
further analysis.

## 📜 Description
This script prompts the user to provide SMTP server details, email credentials, recipient 
information, URL, subject, and select an email template from the Templates folder. 
Based on the chosen template, the script will prompt for additional input specific to 
that template. After gathering the required information, it sends an email with the 
specified content and attachments. Additionally, it can start an Impacket SMB server to 
capture NTLM hashes for further analysis.

## 📧 Email Templates
The email templates are stored in the Templates folder. After running the script, you 
will be prompted to choose an email template file from this folder. Depending on the 
selected template, you will need to provide different inputs.

Available Email Templates:

1. Blocked Account Reset Password Email Template
2. Account Notification Email Template

### Parameters
Based on the selected email template, the following parameters are required:

- `SMTP Server Name:` Hostname or IP of the SMTP server.
- `SMTP Port:` Port number of the SMTP server.
- `Username:` SMTP server username for authentication.
- `Password:` SMTP server password for authentication.
- `Sender Email:` Email address of the sender.
- `Recipient Email:` Email address of the recipient.
- `URL:` URL to include in the email.
- `Subject:` Email subject.

For the "Blocked Account Reset Password Email Template," additional parameters like recipient's first name is needed.

### Demos

### Executing the Script using Microsoft Suspicious Login Template Email

![Microsoft-1](https://github.com/dshabani96/CVE-2024-21413/assets/107131685/25701e85-a558-4ea9-91bf-48d187608685)

###  Executing the Script using Blocked Account Reset Password Template Email

![Microsoft-2](https://github.com/dshabani96/CVE-2024-21413/assets/107131685/0d7641fd-8fdf-4336-945d-fa02bba3d9b8)

## Possible Escalations

You can chain this CVE with CVE-2023-21716 or CVE-2022-30190 to obtain Remote Code Execution (RCE).

## ⚠️ Disclaimer
This tool is intended for educational and ethical testing purposes only. Unauthorized 
scanning, testing, or exploiting of systems is illegal and unethical. Ensure you have 
explicit, authorized permission to engage in any testing or exploitation activities 
against target systems. The script needs to be run as a superuser.

## 📌 Author

**Dionis Shabani**

- [LinkedIn](https://www.linkedin.com/in/dionis-s-892220202/)
文件快照

[4.0K] /data/pocs/31adf5da1972fba6652233bb129777f91c581c57 ├── [7.0K] CVE-2024-21414.py ├── [1.0K] LICENSE ├── [3.1K] README.md └── [4.0K] Templates ├── [1.5K] Blocked-Account-Reset-Password-Email-Template.html └── [4.3K] Microsoft-Suspicious-Login-Attempt-Email-Template.html 1 directory, 5 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。