Commit ed2ad178dd033e44e9a1f16ede54cdecb6d20bbf

Authored by Shiao Qu
Committed by GitHub
1 parent 34a66737

Update oledir.py

Some of them are not known bad, so removed.

"New Moniker" is usually embedded in the "MonikerArray" field of the Composite Moniker, so if Composite Moniker is not parsed, no need to check if this moniker exists.

HTA Moniker, Script/Scriptlet Moniker will not appear in documents.
These are loaded by checking the "content-type" from the remote server("Media Negotiate" procedure) or extension names from the file("GetClassFile" function), or just from the registry.
Showing 1 changed file with 8 additions and 15 deletions
oletools/oledir.py
... ... @@ -123,32 +123,25 @@ KNOWN_CLSIDS = {
123 123 # MS Office files
124 124 '00020906-0000-0000-C000-000000000046': 'Microsoft Word 97-2003 Document',
125 125 '00020900-0000-0000-C000-000000000046': 'Microsoft Word 6.0-7.0 Document',
  126 + '00020832-0000-0000-C000-000000000046': 'Excel sheet with macro enabled',
  127 + '00020833-0000-0000-C000-000000000046': 'Excel binary sheet with macro enabled',
  128 +
126 129 # OLE Objects
127 130 '00000300-0000-0000-C000-000000000046': 'StdOleLink (embedded OLE object)',
128   - '0002CE02-0000-0000-C000-000000000046': 'MS Equation Editor (may trigger CVE-2017-11882)',
  131 + '0002CE02-0000-0000-C000-000000000046': 'MS Equation Editor (may trigger CVE-2017-11882 or CVE-2018-0802)',
129 132 'F20DA720-C02F-11CE-927B-0800095AE340': 'Package (may contain and run any file)',
130 133 '0003000C-0000-0000-C000-000000000046': 'Package (may contain and run any file)',
131 134 'D27CDB6E-AE6D-11CF-96B8-444553540000': 'Shockwave Flash Object (may trigger many CVEs)',
132 135 'A08A033D-1A75-4AB6-A166-EAD02F547959': 'otkloadr CWRAssembly Object (may trigger CVE-2015-1641)',
133 136 'D7053240-CE69-11CD-A777-00DD01143C57': 'Microsoft Forms 2.0 CommandButton',
134 137 # Monikers
135   - '00000303-0000-0000-C000-000000000046': 'File Moniker',
136   - '00000304-0000-0000-C000-000000000046': 'Item Moniker',
137   - '00000305-0000-0000-C000-000000000046': 'Anti Moniker',
138   - '00000306-0000-0000-C000-000000000046': 'Pointer Moniker',
139   - '00000308-0000-0000-C000-000000000046': 'Packager Moniker',
  138 + '00000303-0000-0000-C000-000000000046': 'File Moniker (may trigger CVE-2017-0199 or CVE-2017-8570)',
140 139 '00000309-0000-0000-C000-000000000046': 'Composite Moniker (may trigger CVE-2017-8570)',
141   - '0000031a-0000-0000-C000-000000000046': 'Class Moniker',
142 140 '0002034c-0000-0000-C000-000000000046': 'OutlookAttachMoniker',
143 141 '0002034e-0000-0000-C000-000000000046': 'OutlookMessageMoniker',
144   - '79EAC9E0-BAF9-11CE-8C82-00AA004BA90B': 'URL Moniker (may trigger CVE-2017-0199)',
145   - 'ECABB0C7-7F19-11D2-978E-0000F8757E2A': 'SOAP Moniker',
  142 + '79EAC9E0-BAF9-11CE-8C82-00AA004BA90B': 'URL Moniker (may trigger CVE-2017-0199 or CVE-2017-8570)',
  143 + 'ECABB0C7-7F19-11D2-978E-0000F8757E2A': 'SOAP Moniker (may trigger CVE-2017-8759)',
146 144 'ECABAFC6-7F19-11D2-978E-0000F8757E2A': 'New Moniker',
147   - # ref: https://justhaifei1.blogspot.nl/2017/07/bypassing-microsofts-cve-2017-0199-patch.html
148   - '06290BD2-48AA-11D2-8432-006008C3FBFC': 'Factory bindable using IPersistMoniker (scripletfile)',
149   - '06290BD3-48AA-11D2-8432-006008C3FBFC': 'Script Moniker, aka Moniker to a Windows Script Component (may trigger CVE-2017-0199)',
150   -
151   - '3050F4D8-98B5-11CF-BB82-00AA00BDCE0B': 'HTML Application (may trigger CVE-2017-0199)',
152 145 }
153 146  
154 147  
... ... @@ -272,4 +265,4 @@ def main():
272 265  
273 266  
274 267 if __name__ == '__main__':
275   - main()
276 268 \ No newline at end of file
  269 + main()
... ...