Skip to content

Generates meeting requests taking advantage of CVE-2023-23397. This requires the outlook thick client to send.

License

Notifications You must be signed in to change notification settings

whogotpwned/CVE-2023-23397_EXPLOIT

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2023-23397 MS Outlook Vulnerability Exploitation

CVE-2023-23397 is a vulnerability in Microsoft Outlook that allows an attacker to potentially exfiltrate user authentication details. The vulnerability stems from the ability of an attacker to specify a Universal Naming Convention (UNC) path in the "ReminderSoundFile" property within an email or meeting invite. When the reminder triggers in Outlook, the user's client attempts to load the sound file specified in the path. If Outlook initiates an SMB connection to a remote SMB server, it might be possible for the attacker to intercept the user's Net-NTLMv2 hash and relay this to authenticate as the user.

This GitHub project contains a proof-of-concept (PoC) Python script to demonstrate the exploitation of this vulnerability. The PoC is based on concepts from Dominic Chell's MDSec post Exploiting CVE-2023-23397: Microsoft Outlook Elevation of Privilege Vulnerability and ports these concepts to Python using the win32com.client library.

Usage

  1. Clone the repository and navigate to the project directory.
  2. Replace the BAD_ADDRESS variable in the cve-2023-23397.py script with the desired UNC path for the external resource.
    • The UNC path can also be used to make a WebDAV request to an external domain by appending "@80" or "@SSL@443" to the hostname / IP
  3. Set the MEETING_RECIPIENTS and other variables as needed.
  4. Run the cve-2023-23397.py script to send the meeting request and exploit the vulnerability.

Note

This script uses the win32com.client library, which is Windows specific and requires the pywin32 package. Install it using pip install pywin32 before running the script.

Disclaimer

This project is for educational and research purposes only. The authors and contributors are not responsible for any misuse or damage caused by the exploitation of this vulnerability. Please use responsibly and ensure you have proper authorization before testing.

About

Generates meeting requests taking advantage of CVE-2023-23397. This requires the outlook thick client to send.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%