Quick POC to replicate the 'Follina' Office RCE vulnerability for local testing purposes. Running the script will generate the clickme.docx
payload file in your current working directory, and start a web server with the payload file (www/exploit.html
). Will run on localhost by default, modify parameters in follina.py
as needed.
As far as I'm aware the file that is executed needs to end in .exe
, but you can load it from a remote file share to farm some hashes if you want.
⚠ DO NOT USE IN PRODUCTION LEST YOU BE REGARDED A DUMMY
Thanks to @KevTheHermit for sharing their poc, and John Hammond for their further work on analysing payload requirements. Additional thanks to @theluemmel for sharing their payload with me.