Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Ridter/RTF_11882_0802
PoC for CVE-2018-0802 And CVE-2017-11882
https://github.com/Ridter/RTF_11882_0802
Last synced: about 2 months ago
JSON representation
PoC for CVE-2018-0802 And CVE-2017-11882
- Host: GitHub
- URL: https://github.com/Ridter/RTF_11882_0802
- Owner: Ridter
- License: mit
- Created: 2018-01-12T11:38:33.000Z (about 7 years ago)
- Default Branch: master
- Last Pushed: 2018-01-12T11:42:29.000Z (about 7 years ago)
- Last Synced: 2024-08-05T17:40:47.422Z (5 months ago)
- Language: Python
- Size: 3.91 KB
- Stars: 168
- Watchers: 9
- Forks: 67
- Open Issues: 0
-
Metadata Files:
- Readme: README.MD
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - Ridter/RTF_11882_0802 - PoC for CVE-2018-0802 And CVE-2017-11882 (Python)
README
# RTF_11882_0802
## CVE-2017-11882
CVE-2017-11882: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11882
MITRE CVE-2017-11882: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11882
Research: https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about
Patch analysis: https://0patch.blogspot.ru/2017/11/did-microsoft-just-manually-patch-their.html
## CVE-2018-0802
CVE-2018-0802: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0802
Research: https://research.checkpoint.com/another-office-equation-rce-vulnerability/
## Usage
```
usage: RTF_11882_0802.py [-h] -c COMMAND -o OUTPUT [-i INPUT]PoC for CVE-2010-0802 And CVE-2017-11882
optional arguments:
-h, --help show this help message and exit
-c COMMAND, --command COMMAND
Command run in target system
-o OUTPUT, --output OUTPUT
Output exploit rtf
-i INPUT, --input INPUT
Input normal rtf.
```