MS Office - RTF Files RCE
Theory
RTF files are widely used in business communications for their rich formatting capabilities, making them a perfect disguise for malicious payloads. CVE-2023-21716 and CVE-2017-11882 are vulnerabilities within Microsoft Office that can be leveraged to execute arbitrary code when victims open a compromised RTF file.
The page is about weaponize RTF files for effective phishing campaigns
Practice
CVE-2017-11882
We may use this exploit (python) which provides a quick and effective way to exploit Microsoft RTF RCE vulnerability.
Firts, generate the malicious RTF file
The exploit will call and execute an HTA file, you may generate it as follow
Host bad.hta
on your webserver and start a listener
Finally, send the bad.rtf
file to the target. Once victim will open malicious RTF file, you will get a reverse shell.
CVE-2023-21716
The exploit isn't weaponized yet, but here is the python POC
Last updated