MS Excel remote code execution via OLE objects, affects versions 2007-2016 on Windows. Exploitable through security warning bypass or double click
Reporter | Title | Published | Views | Family All 179 |
---|---|---|---|---|
Securelist | APT Trends report Q3 2017 | 14 Nov 201709:41 | – | securelist |
Securelist | RevengeHotels: cybercrime targeting hotel front desks worldwide | 28 Nov 201910:00 | – | securelist |
Securelist | The BlueNoroff cryptocurrency hunt is still on | 13 Jan 202209:00 | – | securelist |
Securelist | Spam and phishing in Q3 2017 | 3 Nov 201710:00 | – | securelist |
Securelist | Spam and phishing in Q2 2017 | 22 Aug 201709:00 | – | securelist |
Securelist | Gaza Cybergang – updated activity in 2017: | 30 Oct 201709:00 | – | securelist |
Securelist | What’s happening in the world of crimeware: Emotet, DarkGate and LokiBot | 3 Aug 202310:00 | – | securelist |
Securelist | GreyEnergy’s overlap with Zebrocy | 24 Jan 201909:00 | – | securelist |
Securelist | CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction | 6 Jun 202208:00 | – | securelist |
Securelist | IT threat evolution Q2 2017. Statistics | 15 Aug 201709:00 | – | securelist |
Title: MS Office Excel (all versions) Arbitrary Code Execution Vulnerability
Date: September 30th, 2017.
Author: Eduardo Braun Prado
Vendor Homepage: http://www.microsoft.com/
Software Link: https://products.office.com/
Version: 2007,2010,2013,2016 32/64 bits (x86 and x64)
Tested on: Windows 10/8.1/8.0/7/Server 2012/Server 2008/Vista (X86 and x64)
CVE: 2017-0199
Description:
MS Excel contains a remote code execution vulnerability upon processing OLE objects. Although this is a different issue from the
MS Word HTA execution vulnerability, it has been patched together, 'silently'. By performing some tests from the Word HTA PoC posted
on exploit-db[dot]com, it´s possible to exploit it through Excel too, however the target would need to either accept a security warning
regarding external links or double click inside the Excel window, same applies for Powerpoint, so I guess this is the reason, Word caught
the attention and no exploit PoC was made available to other Office apps.
This vulnerability exists in the way Excel handles parameters passed to the "DDEService" attribute of links, leading to the search for a
program to display it. As it does not impose restrictions on what program is going to be executed, for instance, only programs located in the
Office install directory, it is possible to invoke arbitrary local programs with parameters, leading to system compromise.
Since Excel blocks automatic update of linked files, the target must be tricked into double clicking anywhere inside the document.
(The linked object occupies basicly the whole document window). Without the patch applied no warning/prompt is shown;
With the patch a prompt is shown asking if it´s ok to run 'xxxx.exe', where 'xxxx.exe' can have arbitrary names as long as it´s at most 8
chars long, so we could still fake/spoof it as another Office app (the app name cannot be the same of the legitimate, eg. 'Excel').
Proof of Concept:
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42995.zip
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo