• XSS.stack #1 – первый литературный журнал от юзеров форума

CVE-2020-0674 Exploitable through Office docs. Price dropped.

В этой теме можно использовать автоматический гарант!

Windefender

RAID-массив
Пользователь
Регистрация
22.11.2019
Сообщения
81
Реакции
10
Гарант сделки
4
CVE 2020-0674 Is IE vulnerability patched in 2020 Feb. MS Office Addins use default browser IE or edge only no matter what other browsers are installed on computer. This exploit will work with MS office on below mentioned computers ....



Код:
 Windows 7 x86 Yes
Windows 8 x86 Yes
Windows 8.1 x86 Yes
Windows 10 x86 ver. > = 1903 Yes
Windows 7 x64 Yes
Windows 8 x64 Yes
Windows 8.1 x64 Yes

Windows 10 ver. <1903 / Office 365  
Windows 10 ver. > = 1903 / Office 365 ver <16.0.116291
   
   
Office 2007 to office 365 ver <16.0.11629 yes [/ CODE]

[CODE] REF :: https://docs.microsoft.com/en-us/office/dev/add-ins/concepts/browsers-used-by-office-web-add-ins


Price 25k USD, payment in BTC.

Escrow deal is welcome, you pay the fee.

Runtime bypass on AVG, Avast, Kasper, Mcaffee, Windows Defender, ESET, Avira (Other AV can check on demand)

Scantime:
A.
A.HTML file: https://avcheck.net/id/YNwpDiI5FuxD
A.
A.Doc file: https://avcheck.net/id/roPQenULGGuuS
A.
A.Payload is embedded in document.
 
https://xss.pro/threads/37388/#post-227212
 
[QUOTE = "yashechka, post: 227216, member: 136806"]
[URL unfurl = "true"] https://xss.pro/threads/37388/#post-227212 [/ URL]
[/ QUOTE]


The POC in question is

Код:
 For free posting - https://github.com/maxpl0it/CVE-2020-0674-Exploit

This POC only works on windows 7 and only x64. What I am selling is not a Proof of concept but fully weaponized working exploit. With major AV bypassed on runtime.

Windows 7 x86 Yes
Windows 8 x86 Yes
Windows 8.1 x86 Yes
Windows 10 x86 ver. > = 1903 Yes
Windows 7 x64 Yes
Windows 8 x64 Yes
Windows 8.1 x64 Yes

Windows 10 ver. <1903 / Office 365
Windows 10 ver. > = 1903 / Office 365 ver <16.0.116291


Office 2007 to office 365 ver <16.0.11629 yes
 
Please before posting and trashing sales thread, read properly. And if moderator wants to test the exploit most welcome.
 

Вложения

  • screencapture-github-maxpl0it-CVE-2020-0674-Exploit-2020-05-17-15_19_08.png
    screencapture-github-maxpl0it-CVE-2020-0674-Exploit-2020-05-17-15_19_08.png
    159.6 КБ · Просмотры: 104
Последнее редактирование:


Напишите ответ...
Верх