CVE-2017-8759 | Exploit toolkit CVE-2017-8759 - v1.0 is a handy python | Security Testing library
kandi X-RAY | CVE-2017-8759 Summary
kandi X-RAY | CVE-2017-8759 Summary
Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Parse arguments .
- Main thread .
- Start the RTF server .
- Generate the malicious RTF .
CVE-2017-8759 Key Features
CVE-2017-8759 Examples and Code Snippets
Community Discussions
Trending Discussions on CVE-2017-8759
QUESTION
It all started when I wanted to analyze the code around CVE-2017-8759. I knew that the fix for the CVE was in a class named WsdlParser.cs inside System.Runtime.Remoting.dll which is part of the .Net Framework. You probably have this dll on your computer at a location similar to:
C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework.NETFramework\v4.7\System.Runtime.Remoting.dll
I used ilspycmd to re-assemble the code back to C#, and noticed that the WsdlParser.cs was missing in the output directory:
I later used CFF Explorer and saw that this type is indeed missing in the metadata in TypeDefs:
However, I know for a fact that this class is there:
- It's in Microsoft's documentation: https://referencesource.microsoft.com/System.Runtime.Remoting/metadata/wsdlparser.cs.html
When using reflection and LoadAssembly() I was able to find the class:
...
ANSWER
Answered 2020-Apr-28 at 15:24What you've found is a Reference Assembly. There's a big clue to that in the path you found it in.
Reference assemblies are a special type of assembly that contain only the minimum amount of metadata required to represent the library's public API surface. They include declarations for all members that are significant when referencing an assembly in build tools, but exclude all member implementations and declarations of private members that have no observable impact on their API contract.
(My emphasis)
And:
Generating reference assemblies for your libraries can be useful when your library consumers need to build their programs against many different versions of the library. Distributing implementation assemblies for all these versions might be impractical because of their large size. Reference assemblies are smaller in size, and distributing them as a part of your library's SDK reduces download size and saves disk space.
No magic, just a publicly documented means of distributing smaller files when the full file isn't required.
These assemblies are used at compile time, but not at runtime. For that you need an implementation assembly, which will be supplied by other means, such as it having been placed in the GAC.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install CVE-2017-8759
You can use CVE-2017-8759 like any standard Python library. You will need to make sure that you have a development environment consisting of a Python distribution including header files, a compiler, pip, and git installed. Make sure that your pip, setuptools, and wheel are up to date. When using pip it is generally recommended to install packages in a virtual environment to avoid changes to the system.
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page