fengziHK / follina.py

Quick POC to replicate the 'Follina' Office RCE vulnerability for local testing purposes

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

'Follina' Microsoft Office RCE

Quick POC to replicate the 'Follina' Office RCE vulnerability for local testing purposes. Running the script will generate the clickme.docx payload file in your current working directory, and start a web server with the payload file (www/exploit.html). The web server listens on all interfaces by default, but the payload file will point towards your local host for retrieving it. Modify parameters in follina.py as needed.

As far as I'm aware the file that is executed needs to end in .exe, but you can load it from a remote file share to farm some hashes if you want. Alternatively, you can adapt the payload to run encoded powershell as observed in the original payloads, described by Kevin Beaumont in the blog linked below.

Usage: python3 ./follina.py

⚠ DO NOT USE IN PRODUCTION LEST YOU BE REGARDED A DUMMY

Thanks to Kevin Beaumont for his original analysis of the issue, @KevTheHermit for sharing their poc, and John Hammond for their further work on analysing payload requirements. Additional thanks to @mkolsek for the template supporting Office 2019, and @theluemmel for sharing their version of the payload with me.

About

Quick POC to replicate the 'Follina' Office RCE vulnerability for local testing purposes


Languages

Language:Smarty 80.0%Language:Python 20.0%