Info: A remote code execution vulnerability(CVE-2017-0199) exists in Microsoft word. The successful exploitation of this vulnerability could take control of an affected system. An attacker could get metasploit meterpreter session.
Source code:
Note : Source code is for Security Researchers and maintained only for a research propose. Please do use for Educational propose.
1. https://github.com/bhdresh/CVE-2017-0199
2. https://www.rapid7.com/db/modules/exploit/windows/fileformat/office_word_hta
3. https://github.com/Trietptm-on-Security/htattack
Verification: Verified by 0day Exploit Code Team.
Tested on Windows 10 (64 bit), Windows server 2012(64 bit), Windows 7(64 bit), Windows 8.1(64 bit) with Microsoft Word 2010.
Patch:
1. https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0199
If you have any questions related to this exploit, please feel free to ask your questions.
Source code:
Note : Source code is for Security Researchers and maintained only for a research propose. Please do use for Educational propose.
1. https://github.com/bhdresh/CVE-2017-0199
2. https://www.rapid7.com/db/modules/exploit/windows/fileformat/office_word_hta
3. https://github.com/Trietptm-on-Security/htattack
Verification: Verified by 0day Exploit Code Team.
Tested on Windows 10 (64 bit), Windows server 2012(64 bit), Windows 7(64 bit), Windows 8.1(64 bit) with Microsoft Word 2010.
1. https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0199
If you have any questions related to this exploit, please feel free to ask your questions.