Skip to content

drgreenthumb93/CVE-2022-30190-follina

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2022-30190-follina

Just another PoC for the new MSDT-Exploit

To edit the Doc, just open with 7z, xarchiver, ... to change the value in word\rels\document.xml.rels to your IP.

The exploit must contain at least 3541 characters before the window.location.href, and they must be within the script tag. Now there are about 9000, just to be sure.

More about the exploit:

https://www.borncity.com/blog/2022/06/01/follina-schwachstelle-cve-2022-30190-warnungen-erste-angriffe-der-status/ (german)
https://packetstormsecurity.com/files/167317/msdt-poc.txt

Mitigation and workaround:

https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/

Windows Defender already knows that this is a security flaw (Trojan:Win32/Mesdetty.D), so you have to edit the file, in case you get busted.

REMEMBER: ONLY FOR EDUCATIONAL PURPOSES!!! ;)

To-Do:

  • Obfuscation
  • Invoke PS Script

About

Just another PoC for the new MSDT-Exploit

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages