Skip to content

Quick POC to replicate the 'Follina' Office RCE vulnerability for local testing purposes

Notifications You must be signed in to change notification settings

wifiuk/follina.py

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 

Repository files navigation

'Follina' Microsoft Office RCE

Quick POC to replicate the 'Follina' Office RCE vulnerability for local testing purposes. Running the script will generate the clickme.docx payload file in your current working directory, and start a web server with the payload file (www/exploit.html). Will run on localhost by default, modify parameters in follina.py as needed.

As far as I'm aware the file that is executed needs to end in .exe, but you can load it from a remote file share to farm some hashes if you want.

⚠ DO NOT USE IN PRODUCTION LEST YOU BE REGARDED A DUMMY

Thanks to @KevTheHermit for sharing their poc, and John Hammond for their further work on analysing payload requirements. Additional thanks to @theluemmel for sharing their payload with me.

About

Quick POC to replicate the 'Follina' Office RCE vulnerability for local testing purposes

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Smarty 80.8%
  • Python 19.2%