WPS Office从路径穿越到远程代码执行漏洞(CVE-2024-7262)分析与复现 - 嘶吼 RoarTalk – 网络安全行业综合服务平台,4hou.com
Tags
attack-pattern: Javascript - T1059.007
Common Information
Type Value
UUID 20a5a1d1-05c9-4c45-aec5-ff468cf6be3e
Fingerprint 6a1f7d9ff5ea93a6
Analysis status DONE
Considered CTI value 0
Text language
Published Oct. 8, 2024, 5:47 p.m.
Added to db Oct. 8, 2024, 12:33 p.m.
Last updated Nov. 17, 2024, 5:56 p.m.
Headline WPS Office从路径穿越到远程代码执行漏洞(CVE-2024-7262)分析与复现
Title WPS Office从路径穿越到远程代码执行漏洞(CVE-2024-7262)分析与复现 - 嘶吼 RoarTalk – 网络安全行业综合服务平台,4hou.com
Detected Hints/Tags/Attributes 6/1/17
Source URLs
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 268 嘶吼 RoarTalk – 网络安全行业综合服务平台,4hou.com https://www.4hou.com/feed 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details CVE 32
cve-2024-7262
Details Domain 641
nvd.nist.gov
Details Domain 3
avd.aliyun.com
Details File 2
office程序promecefpluginhost.exe
Details File 8
wps.exe
Details File 2
将启动wps.exe
Details File 2
此时wps.exe
Details File 4
wpscloudsvr.exe
Details File 2
中的qingbangong.dll
Details File 2
如果launchname参数指定的是promecefpluginhost.exe
Details File 2
将加载ksojscore.dll
Details File 2
因为下载后的文件名并没有.dll
Details File 2
而在加载的时候如果没有指定.dll
Details File 2
使用poc.py
Details Url 5
https://nvd.nist.gov/vuln/detail/cve-2024-7262
Details Url 3
https://avd.aliyun.com/detail?id=avd
Details Windows Registry Key 1
HKEY_CLASSES_ROOT\ksoqing\shell\open\command