Quick and easy "proof of concept" for the Follina RCE that affects Microsoft Office/365 products. This POC supports both the one-click exploit and the zero-click exploit through RTF files.
Running the script will generate an infected.zip
archive that contains two files:
- A
zero-click.rtf
file that allows you to test the RCE without opening the file (simply previewing the file will trigger the exploit) - A
one-click.doc
file that triggers the exploit when opened
- Edit
follina.py
and setCOMMAND
to execute (defaults to calc),INTERFACE
(defaults to eth0) andPORT
(defaults to 8000) - Run
./follina.py
- Copy and extract the
infected.zip
on the target machine - From the target machine, open
one-click.doc
or simply previewzero-click.rtf