meowhua15 / CVE-2022-30190

An exploitation of CVE-2022-30190 (Follina)

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2022-30190

Based on https://github.com/JohnHammond/msdt-follina

Environment Setup

Use files in /env-setup

  1. Virtual Machine: use VirtualBox and Win10_21H2_English_x32.iso (Build 19044.1288)
  2. Install Microsoft Word, run setup.exe /configure configuration.xml using cmd inside /env-setup/odt-2013
  3. Install Python 3.8.10

Exploitation

  1. Turn off Virus and Threat Scanning in Window's settings
  2. Make sure you have all the Python packages needed
    • Often need to install netifaces using pip install netifaces
  3. Get your machine's IP address (ipconfig)
  4. Run py folina.py -i <ip-address> (refer to the original repo for more details)
  5. Open the malicious doc file. Then the msdt, sdiagnhost and a calcualtor should pop up

About

An exploitation of CVE-2022-30190 (Follina)


Languages

Language:Python 100.0%