Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-23397 PoC — Microsoft Outlook Elevation of Privilege Vulnerability

Source
Associated Vulnerability
Title:Microsoft Outlook Elevation of Privilege Vulnerability (CVE-2023-23397)
Description:Microsoft Outlook Elevation of Privilege Vulnerability
Readme
# CVE-2023-23397-PoC

C# send only version of [CVE-2023-23397-POC-Powershell](https://github.com/api0cradle/CVE-2023-23397-POC-Powershell) by Oddvar Moe (@oddvarmoe)

Sends email from the address associated with Outlook account.

```
.\CVE_2023_23397.exe --help
CVE_2023_23397 1.0.0.0
Copyright c  2023

  -t, --to         Required. Recipient email address

  -p, --path       Required. UNC Path

  -s, --subject    Message subject ("Testing New Exploit" if blank)

  -b, --body       Message body ("Here's your meeting invite" if blank)

  --help           Display this help screen.

  --version        Display version information.
  ```
File Snapshot

[4.0K] /data/pocs/0143834d2b6b2e15c03d1b4834db4265e0192d1e ├── [4.0K] CVE_2023_23397 │   ├── [ 182] App.config │   ├── [5.6K] CVE_2023_23397.csproj │   ├── [ 500] packages.config │   ├── [2.0K] Program.cs │   └── [4.0K] Properties │   └── [1.4K] AssemblyInfo.cs ├── [1.4K] CVE_2023_23397.sln ├── [ 11K] LICENSE └── [ 639] README.md 2 directories, 8 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →