目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2023-23397— Microsoft Outlook 安全漏洞

CVSS 9.8 · Critical KEV EPSS 93.40% · P100
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2023-23397の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Microsoft Outlook Elevation of Privilege Vulnerability
ソース: NVD (National Vulnerability Database)
脆弱性説明
Microsoft Outlook Elevation of Privilege Vulnerability
ソース: NVD (National Vulnerability Database)
CVSS情報
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
输入验证不恰当
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Microsoft Outlook 安全漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Microsoft Outlook是美国微软(Microsoft)公司的一套电子邮件应用程序。 Microsoft Outlook存在安全漏洞。以下产品和版本受到影响:Microsoft Office LTSC 2021 for 32-bit editions,Microsoft Outlook 2016 (32-bit edition),Microsoft Office LTSC 2021 for 64-bit editions,Microsoft 365 Apps for Enterprise for
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

Shenlong 10 Questions — AI 深度分析

十问解析:根本原因、利用方式、修复建议、紧迫性。摘要免费,完整版需登录。

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
MicrosoftMicrosoft Office LTSC 2021 16.0.1 ~ https://aka.ms/OfficeSecurityReleases -
MicrosoftMicrosoft Outlook 2016 16.0.0.0 ~ 16.0.5387.1000 -
MicrosoftMicrosoft 365 Apps for Enterprise 16.0.1 ~ https://aka.ms/OfficeSecurityReleases -
MicrosoftMicrosoft Office 2019 19.0.0 ~ https://aka.ms/OfficeSecurityReleases -
MicrosoftMicrosoft Outlook 2013 Service Pack 1 15.0.0.0 ~ 15.0.5537.1000 -

II. CVE-2023-23397の公開POC

#POC説明ソースリンクShenlongリンク
1Exploit for the CVE-2023-23397https://github.com/sqrtZeroKnowledge/CVE-2023-23397_EXPLOIT_0DAYPOC詳細
2Nonehttps://github.com/j0eyv/CVE-2023-23397POC詳細
3CVE-2023-23397 - Microsoft Outlook Vulnerabilityhttps://github.com/alicangnll/CVE-2023-23397POC詳細
4Python script to create a message with the vulenrability properties sethttps://github.com/grn-bogo/CVE-2023-23397POC詳細
5Simple PoC in PowerShell for CVE-2023-23397https://github.com/ka7ana/CVE-2023-23397POC詳細
6Nonehttps://github.com/api0cradle/CVE-2023-23397-POC-PowershellPOC詳細
7CVE-2023-23397 Remediation Script (Powershell)https://github.com/im007/CVE-2023-23397POC詳細
8PoC for CVE-2023-23397https://github.com/cleverg0d/CVE-2023-23397-PoC-PowerShellPOC詳細
9Exploit POC for CVE-2023-23397https://github.com/ahmedkhlief/CVE-2023-23397-POCPOC詳細
10Generates meeting requests taking advantage of CVE-2023-23397. This requires the outlook thick client to send.https://github.com/BillSkiCO/CVE-2023-23397_EXPLOITPOC詳細
11Nonehttps://github.com/djackreuter/CVE-2023-23397-PoCPOC詳細
12CVE-2023-23397 C# PoC https://github.com/moneertv/CVE-2023-23397POC詳細
13Nonehttps://github.com/ahmedkhlief/CVE-2023-23397-POC-Using-Interop-OutlookPOC詳細
14Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.https://github.com/Trackflaw/CVE-2023-23397POC詳細
15Patch for MS Outlook Critical Vulnerability - CVSS 9.8https://github.com/SecCTechs/CVE-2023-23397POC詳細
16Proof of Concept for CVE-2023-23397 in Pythonhttps://github.com/tiepologian/CVE-2023-23397POC詳細
17Python script for sending e-mails with CVE-2023-23397 payload using SMTPhttps://github.com/BronzeBee/cve-2023-23397POC詳細
18Nonehttps://github.com/stevesec/CVE-2023-23397POC詳細
19An exploitation demo of Outlook Elevation of Privilege Vulnerabilityhttps://github.com/madelynadams9/CVE-2023-23397-ReportPOC詳細
20CVE-2023-23397 powershell patch script for Windows 10 and 11 https://github.com/Zeppperoni/CVE-2023-23397-PatchPOC詳細
21Nonehttps://github.com/jacquesquail/CVE-2023-23397POC詳細
22CVE-2023-23397漏洞的简单PoC,有效载荷通过电子邮件发送。https://github.com/CKevens/CVE-2023-23397-POCPOC詳細
23CVE-2023-23397 PoChttps://github.com/vlad-a-man/CVE-2023-23397POC詳細
24Nonehttps://github.com/Muhammad-Ali007/OutlookNTLM_CVE-2023-23397POC詳細
25This script exploits CVE-2023-23397, a Zero-Day vulnerability in Microsoft Outlook, allowing the generation of malicious emails for testing and educational purposes.https://github.com/Pushkarup/CVE-2023-23397POC詳細
26Nonehttps://github.com/ducnorth2712/CVE-2023-23397POC詳細
27C implementation of Outlook 0-click vulnerabilityhttps://github.com/alsaeroth/CVE-2023-23397-POCPOC詳細
28Proof of Work of CVE-2023-23397 for vulnerable Microsoft Outlook client application.https://github.com/TheUnknownSoul/CVE-2023-23397-PoWPOC詳細
29An exploitation demo of Outlook Elevation of Privilege Vulnerabilityhttps://github.com/Cyb3rMaddy/CVE-2023-23397-ReportPOC詳細
30CVE-2023-23397漏洞的简单PoC,有效载荷通过电子邮件发送。https://github.com/3yujw7njai/CVE-2023-23397-POCPOC詳細
31CVE-2023-23397: Remote Code Execution Vulnerability in Microsoft Outlookhttps://github.com/Symbolexe/CVE-2023-23397POC詳細
32C implementation of Outlook 0-click vulnerabilityhttps://github.com/sarsaeroth/CVE-2023-23397-POCPOC詳細
33Nonehttps://github.com/shaolinsec/CVE-2023-23397POC詳細
34CVE-2023-23397漏洞的简单PoC,有效载荷通过电子邮件发送。https://github.com/AiK1d/CVE-2023-23397-POCPOC詳細
35Demonstration of CVE-2023-23397 Outlook Privellege Escalation vulnerabilityhttps://github.com/Agentgilspy/CVE-2023-23397POC詳細
36Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E5%85%B6%E4%BB%96%E6%BC%8F%E6%B4%9E/Microsoft%20Outlook%20%E6%9D%83%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E%20CVE-2023-23397.mdPOC詳細
37Demonstration of CVE-2023-23397 Outlook Privellege Escalation vulnerabilityhttps://github.com/Gilospy/CVE-2023-23397POC詳細
38CVE-2023-23397漏洞的简单PoC,有效载荷通过电子邮件发送。https://github.com/P4x1s/CVE-2023-23397-POCPOC詳細
39Two POCs I created for the CVE-2023-23397 Outlook NTLM vulnerability, to be used internally.https://github.com/Phaedrik/CVE-2023-23397-POCPOC詳細
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2023-23397のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2023-03-14 · 74 CVEs total

CVE-2023-234159.8 CRITICALInternet Control Message Protocol (ICMP) Remote Code Execution Vulnerability
CVE-2023-233929.8 CRITICALHTTP Protocol Stack Remote Code Execution Vulnerability
CVE-2023-217089.8 CRITICALRemote Procedure Call Runtime Remote Code Execution Vulnerability
CVE-2023-234038.8 HIGHMicrosoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-249078.8 HIGHMicrosoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-248678.8 HIGHMicrosoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-234138.8 HIGHMicrosoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-248688.8 HIGHMicrosoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-249098.8 HIGHMicrosoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-234068.8 HIGHMicrosoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-248718.8 HIGHWindows Bluetooth Service Remote Code Execution Vulnerability
CVE-2023-249138.8 HIGHMicrosoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-248728.8 HIGHMicrosoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-233888.8 HIGHWindows Bluetooth Driver Elevation of Privilege Vulnerability
CVE-2023-248768.8 HIGHMicrosoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-248648.8 HIGHMicrosoft PostScript and PCL6 Class Printer Driver Elevation of Privilege Vulnerability
CVE-2023-233838.2 HIGHService Fabric Explorer Spoofing Vulnerability
CVE-2023-248928.2 HIGHMicrosoft Edge (Chromium-based) Webview2 Spoofing Vulnerability
CVE-2023-234058.1 HIGHRemote Procedure Call Runtime Remote Code Execution Vulnerability
CVE-2023-248698.1 HIGHRemote Procedure Call Runtime Remote Code Execution Vulnerability

Showing 20 of 74 CVEs. View all on vendor page →

IV. 関連脆弱性

V. CVE-2023-23397へのコメント

まだコメントはありません


コメントを残す