Commit ed2ad178dd033e44e9a1f16ede54cdecb6d20bbf
Committed by
GitHub
1 parent
34a66737
Update oledir.py
Some of them are not known bad, so removed.
"New Moniker" is usually embedded in the "MonikerArray" field of the Composite Moniker, so if Composite Moniker is not parsed, no need to check if this moniker exists.
HTA Moniker, Script/Scriptlet Moniker will not appear in documents.
These are loaded by checking the "content-type" from the remote server("Media Negotiate" procedure) or extension names from the file("GetClassFile" function), or just from the registry.
Showing
1 changed file
with
8 additions
and
15 deletions
oletools/oledir.py
| ... | ... | @@ -123,32 +123,25 @@ KNOWN_CLSIDS = { |
| 123 | 123 | # MS Office files |
| 124 | 124 | '00020906-0000-0000-C000-000000000046': 'Microsoft Word 97-2003 Document', |
| 125 | 125 | '00020900-0000-0000-C000-000000000046': 'Microsoft Word 6.0-7.0 Document', |
| 126 | + '00020832-0000-0000-C000-000000000046': 'Excel sheet with macro enabled', | |
| 127 | + '00020833-0000-0000-C000-000000000046': 'Excel binary sheet with macro enabled', | |
| 128 | + | |
| 126 | 129 | # OLE Objects |
| 127 | 130 | '00000300-0000-0000-C000-000000000046': 'StdOleLink (embedded OLE object)', |
| 128 | - '0002CE02-0000-0000-C000-000000000046': 'MS Equation Editor (may trigger CVE-2017-11882)', | |
| 131 | + '0002CE02-0000-0000-C000-000000000046': 'MS Equation Editor (may trigger CVE-2017-11882 or CVE-2018-0802)', | |
| 129 | 132 | 'F20DA720-C02F-11CE-927B-0800095AE340': 'Package (may contain and run any file)', |
| 130 | 133 | '0003000C-0000-0000-C000-000000000046': 'Package (may contain and run any file)', |
| 131 | 134 | 'D27CDB6E-AE6D-11CF-96B8-444553540000': 'Shockwave Flash Object (may trigger many CVEs)', |
| 132 | 135 | 'A08A033D-1A75-4AB6-A166-EAD02F547959': 'otkloadr CWRAssembly Object (may trigger CVE-2015-1641)', |
| 133 | 136 | 'D7053240-CE69-11CD-A777-00DD01143C57': 'Microsoft Forms 2.0 CommandButton', |
| 134 | 137 | # Monikers |
| 135 | - '00000303-0000-0000-C000-000000000046': 'File Moniker', | |
| 136 | - '00000304-0000-0000-C000-000000000046': 'Item Moniker', | |
| 137 | - '00000305-0000-0000-C000-000000000046': 'Anti Moniker', | |
| 138 | - '00000306-0000-0000-C000-000000000046': 'Pointer Moniker', | |
| 139 | - '00000308-0000-0000-C000-000000000046': 'Packager Moniker', | |
| 138 | + '00000303-0000-0000-C000-000000000046': 'File Moniker (may trigger CVE-2017-0199 or CVE-2017-8570)', | |
| 140 | 139 | '00000309-0000-0000-C000-000000000046': 'Composite Moniker (may trigger CVE-2017-8570)', |
| 141 | - '0000031a-0000-0000-C000-000000000046': 'Class Moniker', | |
| 142 | 140 | '0002034c-0000-0000-C000-000000000046': 'OutlookAttachMoniker', |
| 143 | 141 | '0002034e-0000-0000-C000-000000000046': 'OutlookMessageMoniker', |
| 144 | - '79EAC9E0-BAF9-11CE-8C82-00AA004BA90B': 'URL Moniker (may trigger CVE-2017-0199)', | |
| 145 | - 'ECABB0C7-7F19-11D2-978E-0000F8757E2A': 'SOAP Moniker', | |
| 142 | + '79EAC9E0-BAF9-11CE-8C82-00AA004BA90B': 'URL Moniker (may trigger CVE-2017-0199 or CVE-2017-8570)', | |
| 143 | + 'ECABB0C7-7F19-11D2-978E-0000F8757E2A': 'SOAP Moniker (may trigger CVE-2017-8759)', | |
| 146 | 144 | 'ECABAFC6-7F19-11D2-978E-0000F8757E2A': 'New Moniker', |
| 147 | - # ref: https://justhaifei1.blogspot.nl/2017/07/bypassing-microsofts-cve-2017-0199-patch.html | |
| 148 | - '06290BD2-48AA-11D2-8432-006008C3FBFC': 'Factory bindable using IPersistMoniker (scripletfile)', | |
| 149 | - '06290BD3-48AA-11D2-8432-006008C3FBFC': 'Script Moniker, aka Moniker to a Windows Script Component (may trigger CVE-2017-0199)', | |
| 150 | - | |
| 151 | - '3050F4D8-98B5-11CF-BB82-00AA00BDCE0B': 'HTML Application (may trigger CVE-2017-0199)', | |
| 152 | 145 | } |
| 153 | 146 | |
| 154 | 147 | |
| ... | ... | @@ -272,4 +265,4 @@ def main(): |
| 272 | 265 | |
| 273 | 266 | |
| 274 | 267 | if __name__ == '__main__': |
| 275 | - main() | |
| 276 | 268 | \ No newline at end of file |
| 269 | + main() | ... | ... |