目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2021-40444— Microsoft MSHTML.DLL 路径遍历漏洞

CVSS 8.8 · High KEV · ランサムウェア EPSS 94.33% · P100
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2021-40444の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Microsoft MSHTML Remote Code Execution Vulnerability
ソース: NVD (National Vulnerability Database)
脆弱性説明
<p>Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability by using specially-crafted Microsoft Office documents.</p> <p>An attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine. The attacker would then have to convince the user to open the malicious document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p> <p>Microsoft Defender Antivirus and Microsoft Defender for Endpoint both provide detection and protections for the known vulnerability. Customers should keep antimalware products up to date. Customers who utilize automatic updates do not need to take additional action. Enterprise customers who manage updates should select the detection build 1.349.22.0 or newer and deploy it across their environments. Microsoft Defender for Endpoint alerts will be displayed as: “Suspicious Cpl File Execution”.</p> <p>Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs.</p> <p>Please see the <strong>Mitigations</strong> and <strong>Workaround</strong> sections for important information about steps you can take to protect your system from this vulnerability.</p> <p><strong>UPDATE</strong> September 14, 2021: Microsoft has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. Please see the FAQ for important information about which updates are applicable to your system.</p>
ソース: NVD (National Vulnerability Database)
CVSS情報
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Microsoft MSHTML.DLL 路径遍历漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Microsoft MSHTML.DLL是美国微软(Microsoft)公司的一个用于解析HTML语言的动态链接库,IE、Outlook、Outlook Express等应用程序都使用了该动态链接库。 Microsoft MSHTML.DLL 存在路径遍历漏洞,远程攻击者可以创建带有恶意ActiveX控件的特制Office文档,诱使受害者打开文档并在系统上执行任意代码。
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

Shenlong 10 Questions — AI 深度分析

十问解析:根本原因、利用方式、修复建议、紧迫性。摘要免费,完整版需登录。

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
MicrosoftWindows 10 Version 1809 10.0.0 ~ 10.0.17763.2183 cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:x86:*
MicrosoftWindows Server 2019 10.0.0 ~ 10.0.17763.2183 cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2183:*:*:*:*:*:*:*
MicrosoftWindows Server 2019 (Server Core installation) 10.0.0 ~ 10.0.17763.2183 cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2183:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1909 10.0.0 ~ 10.0.18363.1801 cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x86:*
MicrosoftWindows 10 Version 21H1 10.0.0 ~ 10.0.19043.1237 cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1237:*:*:*:*:*:x64:*
MicrosoftWindows Server 2022 10.0.0 ~ 10.0.20348.230 cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.230:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 2004 10.0.0 ~ 10.0.19041.1237 cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1237:*:*:*:*:*:x64:*
MicrosoftWindows Server version 2004 10.0.0 ~ 10.0.19041.1237 cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1237:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 20H2 10.0.0 ~ 10.0.19042.1237 cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1237:*:*:*:*:*:x86:*
MicrosoftWindows Server version 20H2 10.0.0 ~ 10.0.19042.1237 cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1237:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1507 10.0.0 ~ 10.0.10240.19060 cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19060:*:*:*:*:*:x86:*
MicrosoftWindows 10 Version 1607 10.0.0 ~ 10.0.14393.4651 cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4651:*:*:*:*:*:x86:*
MicrosoftWindows Server 2016 10.0.0 ~ 10.0.14393.4651 cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4651:*:*:*:*:*:*:*
MicrosoftWindows Server 2016 (Server Core installation) 10.0.0 ~ 10.0.14393.4651 cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4651:*:*:*:*:*:*:*
MicrosoftWindows 7 6.1.0 ~ 6.1.7601.25712 cpe:2.3:o:microsoft:windows_7:6.1.7601.25712:sp1:*:*:*:*:x86:*
MicrosoftWindows 7 Service Pack 1 6.1.0 ~ 6.1.7601.25712 cpe:2.3:o:microsoft:windows_7:6.1.7601.25712:sp1:*:*:*:*:x64:*
MicrosoftWindows 8.1 6.3.0 ~ 6.3.9600.20120 cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20120:*:*:*:*:*:x86:*
MicrosoftWindows Server 2008 Service Pack 2 6.0.0 ~ 6.0.6003.21218 cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21218:*:*:*:*:*:x64:*
MicrosoftWindows Server 2008 Service Pack 2 (Server Core installation) 6.0.0 ~ 6.0.6003.21218 cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21218:*:*:*:*:*:x64:*
MicrosoftWindows Server 2008 Service Pack 2 6.0.0 ~ 6.0.6003.21218 cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21218:*:*:*:*:*:x86:*
MicrosoftWindows Server 2008 R2 Service Pack 1 6.1.0 ~ 6.1.7601.25712 cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25712:*:*:*:*:*:x64:*
MicrosoftWindows Server 2008 R2 Service Pack 1 (Server Core installation) 6.0.0 ~ 6.1.7601.25712 cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25712:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 6.2.0 ~ 6.2.9200.23462 cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23462:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 (Server Core installation) 6.2.0 ~ 6.2.9200.23462 cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23462:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 R2 6.3.0 ~ 6.3.9600.20120 cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20120:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 R2 (Server Core installation) 6.3.0 ~ 6.3.9600.20120 cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20120:*:*:*:*:*:x64:*

II. CVE-2021-40444の公開POC

#POC説明ソースリンクShenlongリンク
1Microsoft MSHTML Remote Code Execution Vulnerability CVE-2021-40444https://github.com/ozergoker/CVE-2021-40444POC詳細
2CVE-2021-40444 POChttps://github.com/DarkSprings/CVE-2021-40444POC詳細
3Nonehttps://github.com/rfcxv/CVE-2021-40444-POCPOC詳細
4根据已知样本反编译代码https://github.com/bambooqj/CVE-2021-40444_EXP_JSPOC詳細
5Nonehttps://github.com/Immersive-Labs-Sec/cve-2021-40444-analysisPOC詳細
6Nonehttps://github.com/vysecurity/CVE-2021-40444POC詳細
7CVE-2021-40444 Sample https://github.com/Udyz/CVE-2021-40444-SamplePOC詳細
8CVE-2021-40444 PoChttps://github.com/lockedbyte/CVE-2021-40444POC詳細
9Nonehttps://github.com/fengjixuchui/CVE-2021-40444-docx-GeneratePOC詳細
10Nonehttps://github.com/KnoooW/CVE-2021-40444-docx-GeneratePOC詳細
11A malicious .cab creation tool for CVE-2021-40444https://github.com/mansk1es/CaboomPOC詳細
12Reverse engineering the "A Letter Before Court 4.docx" malicious files exploting cve-2021-40444https://github.com/jamesrep/cve-2021-40444POC詳細
13Nonehttps://github.com/W1kyri3/Exploit-PoC-CVE-2021-40444-inject-ma-doc-vao-docxPOC詳細
14This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploithttps://github.com/aslitsecurity/CVE-2021-40444_buildersPOC詳細
15POC for CVE-2021-40444https://github.com/khoaduynu/CVE-2021-40444POC詳細
16Malicious document builder for CVE-2021-40444 https://github.com/Jeromeyoung/MSHTMHellPOC詳細
17Nonehttps://github.com/k8gege/CVE-2021-40444POC詳細
18CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploithttps://github.com/klezVirus/CVE-2021-40444POC詳細
19CVE-2021-40444 - Custom CAB templates from MakeCABhttps://github.com/Udyz/CVE-2021-40444-CABPOC詳細
20Modified code so that we don´t need to rely on CAB archiveshttps://github.com/Edubr2020/CVE-2021-40444--CABlessPOC詳細
21CVE 2021 40444 Windows Exploit services.dllhttps://github.com/kal1gh0st/CVE-2021-40444_CAB_archivesPOC詳細
22This docx exploit uses res files inside Microsoft .docx file to execute malicious files. This exploit is related to CVE-2021-40444https://github.com/LazarusReborn/Docx-Exploit-2021POC詳細
23Nonehttps://github.com/H0j3n/CVE-2021-40444POC詳細
24Nonehttps://github.com/metehangenel/MSHTML-CVE-2021-40444POC詳細
25TIC4301 Project - CVE-2021-40444https://github.com/Jeromeyoung/TIC4301_ProjectPOC詳細
26Nonehttps://github.com/TiagoSergio/CVE-2021-40444POC詳細
27An attempt to reproduce Microsoft MSHTML Remote Code Execution (RCE) Vulnerability and using Metasploit Framework.https://github.com/wh00datz/CVE-2021-40444-POCPOC詳細
28Contains the offensive (exploit and auxiliary) modules for the CVE-2021-40444.https://github.com/Zeop-CyberSec/word_mshtmlPOC詳細
29Nonehttps://github.com/Alexcot25051999/CVE-2021-40444POC詳細
30Nonehttps://github.com/lisinan988/CVE-2021-40444-expPOC詳細
31CVE-2021-40444https://github.com/34zY/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-ExploitPOC詳細
32Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploithttps://github.com/MRacumen/CVE-2021-40444POC詳細
33Nonehttps://github.com/RedLeavesChilde/CVE-2021-40444POC詳細
34Nonehttps://github.com/nvchungkma/CVE-2021-40444-Microsoft-Office-Word-Remote-Code-Execution-POC詳細
35Nonehttps://github.com/hqdat809/CVE-2021-40444POC詳細
36Nonehttps://github.com/tiagob0b/CVE-2021-40444POC詳細
37An attempt to reproduce Microsoft MSHTML Remote Code Execution (RCE) Vulnerability and using Metasploit Framework.https://github.com/kagura-maru/CVE-2021-40444-POCPOC詳細
38For learning purpose did a complete analysis on CVE-2021-40444 POC (proof of concept)https://github.com/skitkat/CVE-2021-40444-POCPOC詳細
39CVE-2021-40444 Sample https://github.com/k4k4/CVE-2021-40444-SamplePOC詳細
40CVE-2021-40444 - Custom CAB templates from MakeCABhttps://github.com/Phuong39/CVE-2021-40444-CABPOC詳細
41This repository contains scripts and resources for exploiting the Follina CVE and CVE-2021-40444 vulnerabilities in Microsoft Office. The scripts generate malicious document files that can execute arbitrary code on the target system.https://github.com/basim-ahmad/Follina-CVE-and-CVE-2021-40444POC詳細
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2021-40444のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2021-09-15 · 61 CVEs total

CVE-2021-386479.8 CRITICALOpen Management Infrastructure Remote Code Execution Vulnerability
CVE-2021-369658.8 HIGHWindows WLAN AutoConfig Service Remote Code Execution Vulnerability
CVE-2021-369548.8 HIGHWindows Bind Filter Driver Elevation of Privilege Vulnerability
CVE-2021-264358.1 HIGHWindows Scripting Engine Memory Corruption Vulnerability
CVE-2021-369678.0 HIGHWindows WLAN AutoConfig Service Elevation of Privilege Vulnerability
CVE-2021-386257.8 HIGHWindows Kernel Elevation of Privilege Vulnerability
CVE-2021-386267.8 HIGHWindows Kernel Elevation of Privilege Vulnerability
CVE-2021-386287.8 HIGHWindows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2021-386557.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2021-386307.8 HIGHWindows Event Tracing Elevation of Privilege Vulnerability
CVE-2021-386567.8 HIGHMicrosoft Word Remote Code Execution Vulnerability
CVE-2021-386547.8 HIGHMicrosoft Office Visio Remote Code Execution Vulnerability
CVE-2021-369757.8 HIGHWin32k Elevation of Privilege Vulnerability
CVE-2021-386397.8 HIGHWin32k Elevation of Privilege Vulnerability
CVE-2021-386487.8 HIGHOpen Management Infrastructure Elevation of Privilege Vulnerability
CVE-2021-386467.8 HIGHMicrosoft Office Access Connectivity Engine Remote Code Execution Vulnerability
CVE-2021-386457.8 HIGHOpen Management Infrastructure Elevation of Privilege Vulnerability
CVE-2021-386447.8 HIGHMicrosoft MPEG-2 Video Extension Remote Code Execution Vulnerability
CVE-2021-386537.8 HIGHMicrosoft Office Visio Remote Code Execution Vulnerability
CVE-2021-264347.8 HIGHVisual Studio Elevation of Privilege Vulnerability

Showing 20 of 61 CVEs. View all on vendor page →

IV. 関連脆弱性

V. CVE-2021-40444へのコメント

まだコメントはありません


コメントを残す