9.3
CVSSv2

CVE-2017-8759

Published: 13/09/2017 Updated: 14/01/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 942
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an malicious user to execute code remotely via a malicious document or application, aka ".NET Framework Remote Code Execution Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft .net framework 4.6.1

microsoft .net framework 4.6.2

microsoft .net framework 4.5.2

microsoft .net framework 4.6

microsoft .net framework 2.0

microsoft .net framework 3.5

microsoft .net framework 3.5.1

microsoft .net framework 4.7

Exploits

Source: githubcom/Voulnet/CVE-2017-8759-Exploit-sample Running CVE-2017-8759 exploit sample Flow of the exploit: Word macro runs in the Doc1doc file The macro downloads a badly formatted txt file over wsdl, which triggers the WSDL parser log Then the parsing log results in running mshtaexe which in turn runs a powershell commands t ...
Microsoft NET Framework remote code execution exploit toolkit Affects versions 20, 35, 351, 452, 46, 461, 462 and 47 ...

Github Repositories

Simple C# implementation of CVE-2017-8759

Exploit toolkit for CVE-2017-8759 Do not be an asshole Simple tool written in C# to handle the RCE vulnerability in NET Framework 20, 35, 351, 452, 46, 461, 462 and 47 aka "NET Framework Remote Code Execution Vulnerability" Help C:\Users\Jonas Uliana\tools>CVE-2017-8759exe /h INFO : Exploit toolkit for CVE-2017-8759 DEV : Uliana Tech SITE :

CVE-2017-8759 use file

CVE-2017-8759 CVE-2017-8759 use file

sysmon-config | A Sysmon configuration file This is a forked and modified version of @SwiftOnSecurity's sysmon config It started as a is simply copy of the original repository We merged most of the 30+ open pull requests Thus we have fixed many of the issues that are still present in the original version and extended the coverage with important new extensions Maintaine

Phishing campaigns This repository contains papers on APT groups, which include examples of emails used in the phishing campaigns Often, papers on APT group attacks do not provide email examples, which prompted me to create a repository that specifically includes on papers containing phishing emails This list will be gradually expanded Contributions are welcome For reliabil

CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.

CVE-2017-8759 Weaponisation PoC This repository contains data that can be used to weaponise the CVE-2017-8759 vulnerability For full information visit wwwmdseccouk/blog/ to find the post related to this vulnerability As always, my research is aimed to help the community become more aware of rising threats as well as the adversary simulation community to better simu

CVE-2017-8759

CVE-2017-8759 CVE-2017-8759   如何使用? wwwlz1ycn/?p=799 cmdhta文件修改 192168211149:80 为你的钓鱼域名 端口   同样修改 exploittxt中   examplecom 为你的钓鱼域名 端口 发现很多朋友在BIN to RTF那里出现了问题,本人修改了下别人的脚本,利用创建RTF的函数重写了

Two versions of CVE-2017-8759 exploits

CVE-2017-8759-exploits Two versions of CVE-2017-8759 exploits Example 1 - Downloads a Net dll from a remote location (without touching disk), loads and executes Example 2 - Loads an embedded Net dll and executes

CVE_Assessments_01_2020 (CVE-2017-8759 Update) DVR Examiner File source (download): dmeforensicscom/getlatest The DVR Examiner version 283 relies on the Microsoft NET Framework version 462 that is vulnerable to remote code execution through an application (CVE-2017-8759) The software has a compressed (237z) executable file (NDP462-KB3151800-x86-x64-AllOS-ENUexe)

CVE-2017-8759 Remote Code Execution Vulnerability On SOAP WDSL - Microsoft .NET Framework 4.6.2 Microsoft .NET Framework 4.6.1 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 4.7 Microsoft .NET Framework 4.6 Microsoft .NET Framework 4.5.2 Microsoft .NET Framework 3.5

What is CVE-2017-8759 is Remote Code Execution Vulnerability On SOAP WDSL A remote code execution vulnerability exists when Microsoft NET Framework processes untrusted input An attacker who successfully exploited this vulnerability in software using the NET framework could take control of an affected system An attacker could then install programs; view, change, or delete d

NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements

CVE-2017-8759 This repo contains sample exploits for CVE-2017-8759 for Microsoft PowerPoint, along with a description of how similar vulnerabilities were, and can, be exploited using the same techniques Some background The aim of publishing this repo is to highlight alternative exploitation techniques that defenders may currently be unaware of By highlighting these alternativ

Rapid Deployment Infrastructure for Red Teaming and Penetration Testing

Kraken: Rapid Deployment Infrastructure for Red Teaming and Penetration Testing (aka: KrakenRDI) KrakenRDI is a project to easily deploy Docker containers with a full toolbox for RedTeaming and Penetration Testing Using KrakenRDI you don't need to waste time creating and setting up the environment for you and/or your team Using KrakenRDI there's more than 50 tools a

Running CVE-2017-8759 exploit sample.

CVE-2017-8759-Exploit-sample Running CVE-2017-8759 exploit sample Flow of the exploit: Word macro runs in the Doc1doc file The macro downloads a badly formatted txt file over wsdl, which triggers the WSDL parser log Then the parsing log results in running mshtaexe which in turn runs a powershell commands that runs mspaintexe To test: Run a webserver on port 8080, and put

Exploit toolkit CVE-2017-8759 - v10 Exploit toolkit CVE-2017-8759 - v10 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft NET Framework RCE It could generate a malicious RTF file and deliver metasploit / meterpreter / other payload to victim without any complex configuration Disclaimer This program is fo

LinkedIn: https://www.linkedin.com/in/devmehedi101/ twitter : https://twitter.com/devmehedi101 Facebook page: https://www.facebook.com/devmehedi101

Red-Teaming-documentation List of Awesome Red Team / Red Teaming Resources This list is for anyone wishing to learn about Red Teaming but do not have a starting point Anyway, this is a living resources and will update regularly with latest Adversarial Tactics and Techniques You can help by sending Pull Requests to add more information MY other YouTube channel : ww

Awesome Red Teaming List of Awesome Red Team / Red Teaming Resources This list is for anyone wishing to learn about Red Teaming but do not have a starting point Anyway, this is a living resources and will update regularly with latest Adversarial Tactics and Techniques You can help by sending Pull Requests to add more information Table of Contents Social Engineering OSINT De

CVE-2017-8759 微软word漏洞利用脚本

Exploit tool CVE-2017-8759 Exploit tool CVE-2017-8759 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft NET Framework RCE It could generate a malicious RTF file and deliver metasploit / meterpreter / other payload to victim without any complex configuration Disclaimer This program is for Educational purpos

CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.

CVE-2017-8759 Weaponisation PoC This repository contains data that can be used to weaponise the CVE-2017-8759 vulnerability For full information visit wwwmdseccouk/blog/ to find the post related to this vulnerability As always, my research is aimed to help the community become more aware of rising threats as well as the adversary simulation community to better simu

CVE-2017-8759 漏洞检测脚本

CVE-2017-8759 Research

معرفی و اکسپلویت آسیب پذیری CVE-2017-8759 با تولید یک فایل

Respositorio de recursos para hacking

CEH_resources Respositorio de recursos para hacking Hacking repo --> githubcom/Hack-with-Github/Awesome-Hacking CTF RESOURCES githubcom/apsdehal/awesome-ctf Helpfull commands --> wwwtunnelsupcom/helpful-linux-commands-for-ctfs/ Tools --> resourcesinfosecinstitutecom/tools-of-trade-and-resources-to-prepare-in-a-hacker-ctf

Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.

Exploit toolkit CVE-2017-8759 - v10 Exploit toolkit CVE-2017-8759 - v10 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft NET Framework RCE It could generate a malicious RTF file and deliver metasploit / meterpreter / other payload to victim without any complex configuration Disclaimer This program is fo

CVE-2017-8759 | .NET Framework Remote Code Execution Vulnerability

OHTS CVE-2017-8759 | NET Framework Remote Code Execution Vulnerability Introduction A remote code execution vulnerability exists when Microsoft NET Framework processes untrusted input An attacker who successfully exploited this vulnerability in software using the NET framework could take control of an affected system An attacker could then install programs; view, change,

Just My ports of CVE-2017-8759

CVE-2017-8759 Just My ports of CVE-2017-8759 Code shifted to another parent repository Redirect?

RTF Cleaner, tries to extract URL from malicious RTF samples using CVE-2017-0199 & CVE-2017-8759

RTF-Cleaner RTF Cleaner, tries to extract URL from malicious RTF samples using CVE-2017-0199 & CVE-2017-8759

Recent Articles

IT threat evolution Q2 2020. PC statistics
Securelist • Victor Chebyshev Evgeny Lopatin Fedor Sinitsyn Denis Parinov Oleg Kupreev Alexey Kulaev Alexander Kolesnikov • 03 Sep 2020

IT threat evolution Q2 2020. Review IT threat evolution Q2 2020. Mobile statistics These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. According to Kaspersky Security Network, in Q2: In Q2 2020, Kaspersky solutions blocked attempts to launch one or more types of malware designed to steal money from bank accounts on the computers of 181,725 users. !function(e,i,n,s){var t="InfogramEmbeds",d=e.getElementsByTagName("s...

IT threat evolution Q1 2020. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Oleg Kupreev Evgeny Lopatin Alexey Kulaev • 20 May 2020

These statistics are based on detection verdicts for Kaspersky products received from users who consented to providing statistical data. According to Kaspersky Security Network, Q1 2020 will be remembered primarily for the coronavirus pandemic and cybercriminals’ exploitation of the topic. In particular, the creators of a new modification of the Ginp banking trojan renamed their malware Coronavirus Finder and then began offering it for €0.75 disguised as an app supposedly capable of detectin...

US-CERT lists the 10 most-exploited security bugs and, yeah, it's mostly Microsoft holes people forgot to patch
The Register • Shaun Nichols in San Francisco • 14 May 2020

Update, update, update. Plus: Flash, Struts, Drupal also make appearances Sadly, 111 in this story isn't binary. It's decimal. It's the number of security fixes emitted by Microsoft this week

Vulnerabilities in Microsoft Windows, Office, and Windows Server, for which patches have been available for years, continue to be the favorite target for hackers looking to spread malware. A list posted by US-CERT this week rattles off the 10 most oft-targeted security vulnerabilities during the past three years, and finds that, shock horror, for the most part, keeping up with patching will keep you safe. Microsoft ranks highly in the list because its software is widely used, and provides the mo...

IT threat evolution Q3 2019. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Boris Larin Oleg Kupreev Evgeny Lopatin • 29 Nov 2019

These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. According to Kaspersky Security Network: In Q3 2019, we discovered an extremely unpleasant incident with the popular CamScanner app on Google Play. The new version of the app contained an ad library inside with the Trojan dropper Necro built in. Judging by the reviews on Google Play, the dropper’s task was to activate paid subscriptions, although it could delive...

IT threat evolution Q2 2019. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Boris Larin Oleg Kupreev Evgeny Lopatin • 19 Aug 2019

These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. According to Kaspersky Security Network, Q2 2019 will be remembered for several events. First, we uncovered a large-scale financial threat by the name of Riltok, which targeted clients of not only major Russian banks, but some foreign ones too. Second, we detected the new Trojan.AndroidOS.MobOk malware, tasked with stealing money from mobile accounts through explo...

IT threat evolution Q1 2019. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Boris Larin Oleg Kupreev Evgeny Lopatin • 23 May 2019

These statistics are based on detection verdicts of Kaspersky Lab products received from users who consented to provide statistical data. According to Kaspersky Security Network, Q1 2019 is remembered mainly for mobile financial threats. First, the operators of the Russia-targeting Asacub Trojan made several large-scale distribution attempts, reaching up to 13,000 unique users per day. The attacks used active bots to send malicious links to contacts in already infected smartphones. The mailings ...

IT threat evolution Q1 2018. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Alexander Liskin Oleg Kupreev • 14 May 2018

According to KSN: In Q1 2018, DNS-hijacking, a new in-the-wild method for spreading mobile malware on Android devices, was identified. As a result of hacked routers and modified DNS settings, users were redirected to IP addresses belonging to the cybercriminals, where they were prompted to download malware disguised, for example, as browser updates. That is how the Korean banking Trojan Wroba was distributed. It wasn’t a drive-by-download case, since the success of the attack largely depended ...

The King is dead. Long live the King!
Securelist • Vladislav Stolyarov Boris Larin Anton Ivanov • 09 May 2018

In late April 2018, a new zero-day vulnerability for Internet Explorer (IE) was found using our sandbox; more than two years since the last in the wild example (CVE-2016-0189). This particular vulnerability and subsequent exploit are interesting for many reasons. The following article will examine the core reasons behind the latest vulnerability, CVE-2018-8174. Our story begins on VirusTotal (VT), where someone uploaded an interesting exploit on April 18, 2018. This exploit was detected by sever...

Threat Landscape for Industrial Automation Systems in H2 2017
Securelist • Kaspersky Lab ICS CERT • 26 Mar 2018

For many years, Kaspersky Lab experts have been uncovering and researching cyberthreats that target a variety of information systems – those of commercial and government organizations, banks, telecoms operators, industrial enterprises, and individual users. In this report, Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) publishes the findings of its research on the threat landscape for industrial automation systems conducted during the second hal...

IT threat evolution Q3 2017. Statistics
Securelist • Roman Unuchek Fedor Sinitsyn Denis Parinov Alexander Liskin • 10 Nov 2017

According to KSN data, Kaspersky Lab solutions detected and repelled 277,646,376 malicious attacks from online resources located in 185 countries all over the world. 72,012,219 unique URLs were recognized as malicious by web antivirus components. Attempted infections by malware that aims to steal money via online access to bank accounts were registered on 204,388 user computers. Crypto ransomware attacks were blocked on 186283 computers of unique users. Kaspersky Lab’s file antivirus detected ...

BlackOasis APT and new targeted attacks leveraging zero-day exploit
Securelist • GReAT • 16 Oct 2017

More information about BlackOasis APT is available to customers of Kaspersky Intelligence Reporting Service. Contact: intelreports@kaspersky.com Kaspersky Lab has always worked closely with vendors to protect users. As soon as we find new vulnerabilities we immediately inform the vendor in a responsible manner and provide all the details required for a fix. On October 10, 2017, Kaspersky Lab’s advanced exploit prevention systems identified a new Adobe Flash zero day exploit used in the wild ag...

Here's a timeless headline: Adobe rushes out emergency Flash fix after hacker exploits bug
The Register • Iain Thomson in San Francisco • 16 Oct 2017

So much for that security-patch-free October 'Israel hacked Kaspersky and caught Russian spies using AV tool to harvest NSA exploits'

Adobe today issued an emergency security patch for Flash, which squashes a bug being used in the wild right now by hackers to infect Windows PCs with spyware. The flaw, CVE-2017-11292, was discovered by Kaspersky Labs, and affects all current versions of Flash for Windows, macOS, Linux and Chrome OS. A programming cockup in the software allows malicious Flash files – hidden on websites or embedded in Office documents and other files – to corrupt the plugin's internal memory structures and ga...

It's September 2017, and .NET lets PDFs hijack your Windows PC
The Register • Shaun Nichols in San Francisco • 12 Sep 2017

Look Microsoft, we'll stop these headlines when your stuff stops getting pwned

While much of the tech world is still fixating on Apple's $1,000 face-reading iPhone, administrators are going to be busy testing and deploying this month's Patch Tuesday load. Microsoft, Adobe, and Google have all released patches to mark the second Tuesday of the month. The updates include fixes for Flash, Edge, Internet Explorer, and Android. Redmond's September patch dump addresses a total of 81 CVE-listed vulnerabilities, 39 of which would allow for remote code execution. Four of the flaws ...