POC详情: 83635d7ad4711c0226f31702bc864df897ba49ad

来源
关联漏洞
标题: Microsoft Outlook 安全漏洞 (CVE-2024-21413)
描述:Microsoft Outlook是美国微软(Microsoft)公司的一套电子邮件应用程序。 Microsoft Outlook 存在安全漏洞。以下产品和版本受到影响:Microsoft Office 2019 for 32-bit editions,Microsoft Office 2019 for 64-bit editions,Microsoft 365 Apps for Enterprise for 32-bit Systems,Microsoft 365 Apps for Enterprise
描述
CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC
介绍
# CVE-2024-21413 - Critical Remote Code Execution Vulnerability in Microsoft Outlook

## Overview

CVE-2024-21413 is a critical remote code execution (RCE) vulnerability affecting Microsoft Outlook. This zero-day vulnerability, also known as the "MonikerLink" bug, allows attackers to execute arbitrary code on a victim's machine without any user interaction. The vulnerability is triggered by maliciously crafted email messages that exploit specific types of hyperlinks within Outlook, leading to severe consequences such as system compromise, data exfiltration, or the installation of malware.

## Affected Versions

The vulnerability affects various versions of Microsoft Outlook, including but not limited to:

- Microsoft Office 2016
- Microsoft Office 2019
- Microsoft Office 2021
- Microsoft 365 Apps

These versions are affected across both 32-bit and 64-bit editions.

## Attack Vector

The MonikerLink bug is particularly dangerous because it bypasses the Office Protected View feature, which is designed to open potentially unsafe files in a read-only, sandboxed environment. By exploiting this vulnerability, attackers can bypass these security mechanisms and gain unauthorized access to sensitive information or take control of the victim's system.

## Impact

Successful exploitation of CVE-2024-21413 can result in:

- Remote code execution
- Data exfiltration
- Data encryption
- Credential harvesting
- Installation of malware

Given the severity of this vulnerability, it is crucial that affected systems be patched immediately to prevent potential exploitation.

## Mitigation

To protect against this vulnerability, it is strongly recommended that users and organizations:

- Apply the latest security updates provided by Microsoft.
- Ensure that Outlook and all related Office applications are updated to the latest versions.

For further details and updates, refer to the following sources:

- [Recorded Future](https://www.recordedfuture.com)
- [Triskele Labs](https://www.triskelelabs.com)
- [Vulcan Cyber](https://www.vulcan.io)

## License

This document is licensed under the [MIT License](LICENSE).
文件快照

[4.0K] /data/pocs/83635d7ad4711c0226f31702bc864df897ba49ad ├── [3.5K] CVE-2024-21413-PoC.py ├── [1.0K] LICENSE └── [2.1K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。