Commit 34a66737dca66b5b21df81623d123e2c8a1e4614
1 parent
781e2ad2
oledir: added more CLSIDs
Showing
2 changed files
with
18 additions
and
7 deletions
oletools/oledir.py
| ... | ... | @@ -50,7 +50,7 @@ from __future__ import print_function |
| 50 | 50 | # - added support for zip files and wildcards |
| 51 | 51 | # 2018-04-11 v0.53 PL: - added table displaying storage tree and CLSIDs |
| 52 | 52 | |
| 53 | -__version__ = '0.53dev1' | |
| 53 | +__version__ = '0.53dev2' | |
| 54 | 54 | |
| 55 | 55 | #------------------------------------------------------------------------------ |
| 56 | 56 | # TODO: |
| ... | ... | @@ -122,22 +122,33 @@ STATUS_COLORS = { |
| 122 | 122 | KNOWN_CLSIDS = { |
| 123 | 123 | # MS Office files |
| 124 | 124 | '00020906-0000-0000-C000-000000000046': 'Microsoft Word 97-2003 Document', |
| 125 | + '00020900-0000-0000-C000-000000000046': 'Microsoft Word 6.0-7.0 Document', | |
| 125 | 126 | # OLE Objects |
| 126 | - '0002CE02-0000-0000-C000-000000000046': 'MS Equation Editor (may trigger CVE-2017-11882)', | |
| 127 | - # OLE Links | |
| 128 | 127 | '00000300-0000-0000-C000-000000000046': 'StdOleLink (embedded OLE object)', |
| 128 | + '0002CE02-0000-0000-C000-000000000046': 'MS Equation Editor (may trigger CVE-2017-11882)', | |
| 129 | + 'F20DA720-C02F-11CE-927B-0800095AE340': 'Package (may contain and run any file)', | |
| 130 | + '0003000C-0000-0000-C000-000000000046': 'Package (may contain and run any file)', | |
| 131 | + 'D27CDB6E-AE6D-11CF-96B8-444553540000': 'Shockwave Flash Object (may trigger many CVEs)', | |
| 132 | + 'A08A033D-1A75-4AB6-A166-EAD02F547959': 'otkloadr CWRAssembly Object (may trigger CVE-2015-1641)', | |
| 133 | + 'D7053240-CE69-11CD-A777-00DD01143C57': 'Microsoft Forms 2.0 CommandButton', | |
| 129 | 134 | # Monikers |
| 130 | 135 | '00000303-0000-0000-C000-000000000046': 'File Moniker', |
| 131 | 136 | '00000304-0000-0000-C000-000000000046': 'Item Moniker', |
| 132 | 137 | '00000305-0000-0000-C000-000000000046': 'Anti Moniker', |
| 133 | 138 | '00000306-0000-0000-C000-000000000046': 'Pointer Moniker', |
| 134 | 139 | '00000308-0000-0000-C000-000000000046': 'Packager Moniker', |
| 135 | - '00000309-0000-0000-C000-000000000046': 'Composite Moniker', | |
| 140 | + '00000309-0000-0000-C000-000000000046': 'Composite Moniker (may trigger CVE-2017-8570)', | |
| 136 | 141 | '0000031a-0000-0000-C000-000000000046': 'Class Moniker', |
| 137 | 142 | '0002034c-0000-0000-C000-000000000046': 'OutlookAttachMoniker', |
| 138 | 143 | '0002034e-0000-0000-C000-000000000046': 'OutlookMessageMoniker', |
| 139 | - '79EAC9E0-BAF9-11CE-8C82-00AA004BA90B': 'URL Moniker', | |
| 144 | + '79EAC9E0-BAF9-11CE-8C82-00AA004BA90B': 'URL Moniker (may trigger CVE-2017-0199)', | |
| 140 | 145 | 'ECABB0C7-7F19-11D2-978E-0000F8757E2A': 'SOAP Moniker', |
| 146 | + 'ECABAFC6-7F19-11D2-978E-0000F8757E2A': 'New Moniker', | |
| 147 | + # ref: https://justhaifei1.blogspot.nl/2017/07/bypassing-microsofts-cve-2017-0199-patch.html | |
| 148 | + '06290BD2-48AA-11D2-8432-006008C3FBFC': 'Factory bindable using IPersistMoniker (scripletfile)', | |
| 149 | + '06290BD3-48AA-11D2-8432-006008C3FBFC': 'Script Moniker, aka Moniker to a Windows Script Component (may trigger CVE-2017-0199)', | |
| 150 | + | |
| 151 | + '3050F4D8-98B5-11CF-BB82-00AA00BDCE0B': 'HTML Application (may trigger CVE-2017-0199)', | |
| 141 | 152 | } |
| 142 | 153 | |
| 143 | 154 | |
| ... | ... | @@ -153,7 +164,7 @@ def clsid_display(clsid): |
| 153 | 164 | if clsid in KNOWN_CLSIDS: |
| 154 | 165 | clsid += '\n%s' % KNOWN_CLSIDS[clsid] |
| 155 | 166 | color = 'yellow' |
| 156 | - if 'CVE-' in clsid: | |
| 167 | + if 'CVE' in clsid: | |
| 157 | 168 | color = 'red' |
| 158 | 169 | return (clsid, color) |
| 159 | 170 | ... | ... |
setup.py
| ... | ... | @@ -43,7 +43,7 @@ import os, fnmatch |
| 43 | 43 | #--- METADATA ----------------------------------------------------------------- |
| 44 | 44 | |
| 45 | 45 | name = "oletools" |
| 46 | -version = '0.53dev1' | |
| 46 | +version = '0.53dev2' | |
| 47 | 47 | desc = "Python tools to analyze security characteristics of MS Office and OLE files (also called Structured Storage, Compound File Binary Format or Compound Document File Format), for Malware Analysis and Incident Response #DFIR" |
| 48 | 48 | long_desc = open('oletools/README.rst').read() |
| 49 | 49 | author = "Philippe Lagadec" | ... | ... |