exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/41934
This Metasploit module exploits CVE-2017-0199 by generating a malicious RTF file that, when opened in vulnerable Microsoft Office Word versions, executes arbitrary code via an OLE link object fetching and executing an HTA file from a remote server.
Classification
Working Poc 100%
Target:
Microsoft Office Word (versions affected by CVE-2017-0199)
No auth needed
Prerequisites:
Vulnerable version of Microsoft Office Word · Network access to the target · User interaction to open the malicious RTF file
exploitdb
WORKING POC
by Eduardo Braun Prado · textdoswindows
https://www.exploit-db.com/exploits/42995
This exploit leverages CVE-2017-0199 in Microsoft Excel by abusing the DDEService attribute to execute arbitrary local programs. It requires user interaction (double-click) to trigger the payload, bypassing security warnings in unpatched versions.
Classification
Working Poc 90%
Target:
Microsoft Excel 2007, 2010, 2013, 2016 (32/64-bit)
No auth needed
Prerequisites:
Unpatched Microsoft Excel · User interaction (double-click) · Arbitrary local executable
exploitdb
WORKING POC
by Bhadresh Patel · pythonremotewindows
https://www.exploit-db.com/exploits/41894
This Python script exploits CVE-2017-0199, a Microsoft Office RCE vulnerability, by generating malicious RTF or PPSX files and delivering payloads via HTA/SCT files. It supports both local and remote payload delivery, with optional obfuscation for RTF files.
Classification
Working Poc 95%
Target:
Microsoft Office (various versions)
No auth needed
Prerequisites:
Network access to the target · Victim interaction to open the malicious file
github
WRITEUP
3,480 stars
by qazbnm456 · poc
https://github.com/qazbnm456/awesome-cve-poc/tree/master/CVE-2017-0199.md
This repository provides a curated list of references and external PoC links for CVE-2017-0199, a remote code execution vulnerability in Microsoft Office/WordPad via malicious RTF files. It includes technical analysis links but does not contain direct exploit code.
Classification
Writeup 90%
Target:
Microsoft Office/WordPad (2007, 2010, 2013, 2016)
No auth needed
Prerequisites:
Victim opens a malicious RTF file
nomisec
WORKING POC
729 stars
by bhdresh · client-side
https://github.com/bhdresh/CVE-2017-0199
This repository contains a functional Python script that generates malicious RTF/PPSX files to exploit CVE-2017-0199, a Microsoft Office RCE vulnerability. The toolkit supports multiple attack scenarios, including local and remote payload delivery, and integrates with Metasploit for post-exploitation.
Classification
Working Poc 95%
Target:
Microsoft Office (RTF/PPSX parsing)
No auth needed
Prerequisites:
Python 2.7.13 · Metasploit (optional for payload generation) · Network access to deliver payloads
nomisec
WORKING POC
16 stars
by haibara3839 · poc
https://github.com/haibara3839/CVE-2017-0199-master
This repository contains a functional exploit for CVE-2017-0199, a remote code execution vulnerability in Microsoft Office. The Python script serves a malicious HTA file that leverages the vulnerability to download and execute a payload.
Classification
Working Poc 95%
Target:
Microsoft Office (various versions)
No auth needed
Prerequisites:
Attacker-controlled server to host the malicious HTA file · Victim to open a malicious Office document
github
WRITEUP
14 stars
by xbl3 · poc
https://github.com/xbl3/awesome-cve-poc_qazbnm456/tree/master/CVE-2017-0199.md
This repository provides a curated list of references and external links related to CVE-2017-0199, a vulnerability in Microsoft Office/WordPad that allows remote code execution via malicious RTF files. It includes links to PoC repositories, analysis blogs, and official CVE details but does not contain direct exploit code.
Classification
Writeup 90%
Target:
Microsoft Office/WordPad
No auth needed
Prerequisites:
Victim opens a malicious RTF file
nomisec
WRITEUP
13 stars
by NotAwful · poc
https://github.com/NotAwful/CVE-2017-0199-Fix
This repository provides a detailed technical analysis of CVE-2017-0199, including its exploitation mechanism and a registry-based mitigation. It explains how malicious HTA files embedded in RTF documents can execute code via OLE2 objects and offers a fix by modifying registry keys to replace mshta.exe with notepad.exe.
Classification
Writeup 95%
Target:
Microsoft Office (Word) with OLE2 handling
No auth needed
Prerequisites:
Victim opens a malicious RTF file · OLE2 object handling enabled in Microsoft Word
nomisec
SUSPICIOUS
12 stars
by SyFi · poc
https://github.com/SyFi/cve-2017-0199
The repository contains only a README with a Twitter link and no exploit code or technical details. It appears to be a placeholder or lure without substantive content.
Classification
Suspicious 90%
Target:
unknown
No auth needed
nomisec
WORKING POC
7 stars
by Exploit-install · client-side
https://github.com/Exploit-install/CVE-2017-0199
This repository contains a functional Python script that generates malicious RTF files and delivers payloads to exploit CVE-2017-0199, a Microsoft Word RTF remote code execution vulnerability. The toolkit supports both RTF generation and exploitation modes, integrating with Metasploit for payload delivery.
Classification
Working Poc 95%
Target:
Microsoft Office (RTF parsing component)
No auth needed
Prerequisites:
Python 2.7.13 · Metasploit (for payload generation) · Network access to target
nomisec
SCANNER
3 stars
by jacobsoo · poc
https://github.com/jacobsoo/RTF-Cleaner
This repository contains a Python script designed to extract URLs from malicious RTF files exploiting CVE-2017-0199 and CVE-2017-8759. It does not execute the exploit but analyzes RTF files to identify embedded URLs used in the attack.
Classification
Scanner 90%
Target:
Microsoft Office (RTF parsing)
No auth needed
Prerequisites:
malicious RTF file
nomisec
SCANNER
3 stars
by nicpenning · poc
https://github.com/nicpenning/RTF-Cleaner
This repository contains a PowerShell script designed to de-obfuscate RTF documents exploiting CVE-2017-0199, extracting embedded URLs statically. It does not exploit the vulnerability but aids in analyzing malicious RTF files by cleaning obfuscated content and revealing hidden URLs.
Classification
Scanner 95%
Target:
Microsoft Office (RTF document handling)
No auth needed
Prerequisites:
Malicious RTF document exploiting CVE-2017-0199
nomisec
WRITEUP
2 stars
by Sunqiz · client-side
https://github.com/Sunqiz/CVE-2017-0199-reprofuction
This repository provides a detailed technical analysis and step-by-step reproduction of CVE-2017-0199, a vulnerability in Microsoft Office that allows remote code execution via malicious RTF files with embedded OLE objects. It includes environment setup, exploitation steps, and a breakdown of the vulnerability's root cause involving URL Moniker and HTA handling.
Classification
Writeup 95%
Target:
Microsoft Office (2007, 2010, 2013, 2016)
No auth needed
Prerequisites:
Victim opens a malicious RTF file · ActiveX compatibility settings allowing HTA execution · Network access to attacker-controlled server
github
WORKING POC
2 stars
by dark-vex · pythonpoc
https://github.com/dark-vex/CVE-PoC-collection/tree/master/CVE-2017-0199
This repository contains a functional Python script that generates malicious RTF/PPSX files exploiting CVE-2017-0199, a Microsoft Office RCE vulnerability. The toolkit supports multiple exploitation scenarios, including local/remote payload delivery and custom HTA files.
Classification
Working Poc 95%
Target:
Microsoft Office (RTF/PPSX parsing)
No auth needed
Prerequisites:
Python 2.7.13 · Metasploit (optional for payload generation) · Network access to deliver payloads
nomisec
WORKING POC
2 stars
by kn0wm4d · poc
https://github.com/kn0wm4d/htattack
This repository contains a functional Python exploit for CVE-2017-0199, which leverages a vulnerability in Microsoft Office's handling of RTF documents to achieve remote code execution via a malicious HTA file. The exploit sets up a server to deliver the payload when a victim opens the crafted document.
Classification
Working Poc 95%
Target:
Microsoft Office (RTF document handling)
No auth needed
Prerequisites:
Victim must open a malicious RTF document · Attacker must host a payload on a reachable server
nomisec
WORKING POC
2 stars
by n1shant-sinha · client-side
https://github.com/n1shant-sinha/CVE-2017-0199
This repository contains a Python script that generates malicious RTF files exploiting CVE-2017-0199, a Microsoft Office RTF remote code execution vulnerability. The toolkit can also act as a web server to deliver payloads, supporting Metasploit integration for post-exploitation.
Classification
Working Poc 95%
Target:
Microsoft Office (RTF parsing component)
No auth needed
Prerequisites:
Python 2.7.13 · Metasploit (optional for payload generation) · Network access to victim
nomisec
WORKING POC
2 stars
by mzakyz666 · client-side
https://github.com/mzakyz666/PoC-CVE-2017-0199
This repository contains a functional exploit toolkit for CVE-2017-0199, a Microsoft Word RTF RCE vulnerability. The Python script generates malicious RTF files and sets up a server to deliver payloads when the victim opens the file.
Classification
Working Poc 95%
Target:
Microsoft Word (RTF parsing)
No auth needed
Prerequisites:
Victim must open the malicious RTF file · Attacker must host the payload on a reachable server
nomisec
WRITEUP
1 stars
by ahmed-tarek22752 · poc
https://github.com/ahmed-tarek22752/RCE-CVE-2017-0199-detection-analysis
This repository provides a detailed technical analysis of a malicious DOCX file exploiting CVE-2017-0199, including network behavior, dropped files, registry activity, and detection engineering insights. It includes Sigma rules, Suricata signatures, and EDR hunting queries for blue team use.
Classification
Writeup 95%
Target:
Microsoft Office (Word 2007-2016)
No auth needed
Prerequisites:
Malicious DOCX file · User interaction to open the file
nomisec
WRITEUP
1 stars
by BlueShield-CyberDefense · poc
https://github.com/BlueShield-CyberDefense/RCE-CVE-2017-0199-detection-analysis
This repository provides a detailed technical analysis of a malicious DOCX file exploiting CVE-2017-0199, including network behavior, dropped files, registry activity, and detection rules. It includes IOCs, Sigma rules, Suricata signatures, and EDR hunting queries for blue team use.
Classification
Writeup 95%
Target:
Microsoft Office (Word 2007-2016)
No auth needed
Prerequisites:
Malicious DOCX file · User interaction to open the file
nomisec
WRITEUP
1 stars
by BlueShield-CyberDefense · poc
https://github.com/BlueShield-CyberDefense/Phishing-Analysis
This repository provides a detailed technical analysis of a malicious DOCX file exploiting CVE-2017-0199, including network behavior, dropped files, registry activity, and detection engineering insights. It includes IOCs, Sigma rules, Suricata signatures, and EDR hunting queries for blue team use.
Classification
Writeup 95%
Target:
Microsoft Office (Word 2007-2016)
No auth needed
Prerequisites:
Victim opens malicious DOCX file · Network access to attacker-controlled domain
nomisec
WORKING POC
1 stars
by Phantomlancer123 · client-side
https://github.com/Phantomlancer123/CVE-2017-0199
This repository contains a functional Python script that generates malicious RTF/PPSX files to exploit CVE-2017-0199, a Microsoft Office RCE vulnerability. The toolkit supports multiple attack scenarios, including local and remote payload delivery, and integrates with Metasploit for post-exploitation.
Classification
Working Poc 95%
Target:
Microsoft Office (multiple versions)
No auth needed
Prerequisites:
Python 2.7.13 · Metasploit (optional for payload generation) · Network access to deliver payloads
nomisec
WRITEUP
by BlackOclock · poc
https://github.com/BlackOclock/XLS-to-DBatLoader-or-GuLoader-for-AgentTesla-variant
This repository contains a detailed technical analysis of a malware campaign leveraging CVE-2017-0199, focusing on network traffic, extracted files, and behavioral analysis. It includes PCAP analysis, JA3/JA4 fingerprinting, and triage of HTA/VBS payloads but does not provide functional exploit code.
Classification
Writeup 95%
Target:
Microsoft Office (CVE-2017-0199)
No auth needed
Prerequisites:
Malicious XLS file · Network access to C2 infrastructure
gitlab
WORKING POC
by The-Real-TechLord · poc
https://gitlab.com/The-Real-TechLord/CVE-2017-0199
This repository contains a functional Python script that generates malicious RTF files and delivers payloads to exploit CVE-2017-0199, a Microsoft Word RTF RCE vulnerability. The toolkit supports both RTF generation and exploitation modes, integrating with Metasploit for payload delivery.
Classification
Working Poc 95%
Target:
Microsoft Word (RTF parsing)
No auth needed
Prerequisites:
Python 2.7.13 · Metasploit (optional for payload generation) · Attacker-controlled server to host payloads
nomisec
WORKING POC
by kash-123 · client-side
https://github.com/kash-123/CVE-2017-0199
This repository contains a functional Python script that generates malicious RTF/PPSX files to exploit CVE-2017-0199, a Microsoft Office RCE vulnerability. The toolkit supports both file generation and exploitation modes, delivering payloads via crafted documents.
Classification
Working Poc 95%
Target:
Microsoft Office (multiple versions)
No auth needed
Prerequisites:
Python 3 environment · Network access to deliver payloads · Victim interaction to open malicious file
nomisec
WORKING POC
by TheCyberWatchers · client-side
https://github.com/TheCyberWatchers/CVE-2017-0199-v5.0
This repository contains a functional Python script that exploits CVE-2017-0199, a Microsoft Office RCE vulnerability. The toolkit generates malicious RTF/PPSX files and delivers payloads via HTTP, supporting local and remote payloads, as well as custom HTA files.
Classification
Working Poc 95%
Target:
Microsoft Office (multiple versions)
No auth needed
Prerequisites:
Python 3.x · Metasploit (for payload generation) · Network access to target
nomisec
WORKING POC
by BRAINIAC22 · client-side
https://github.com/BRAINIAC22/CVE-2017-0199
This repository contains a functional Python toolkit for exploiting CVE-2017-0199, a Microsoft Office RCE vulnerability. It generates malicious RTF/PPSX files and delivers payloads via HTA/SCT files, supporting both remote and local payload execution.
Classification
Working Poc 95%
Target:
Microsoft Office (multiple versions)
No auth needed
Prerequisites:
Python environment · Network access to target · Victim interaction to open malicious file
nomisec
WORKING POC
by stealth-ronin · poc
https://github.com/stealth-ronin/CVE-2017-0199-PY-KIT
This repository contains a functional Python-based exploit toolkit for CVE-2017-0199, a Microsoft Office RCE vulnerability. The toolkit can generate malicious RTF/PPSX files and deliver payloads via HTA/SCT files, supporting both local and remote payload execution.
Classification
Working Poc 95%
Target:
Microsoft Office (various versions)
No auth needed
Prerequisites:
Victim must open the malicious RTF/PPSX file · Network connectivity to attacker-controlled server for payload delivery
nomisec
WORKING POC
by likekabin · poc
https://github.com/likekabin/CVE-2017-0199
This repository contains a functional Python script that generates malicious RTF/PPSX files to exploit CVE-2017-0199, a Microsoft Office RCE vulnerability. The toolkit supports multiple attack scenarios, including local/remote payload delivery and custom HTA file execution.
Classification
Working Poc 95%
Target:
Microsoft Office (multiple versions)
No auth needed
Prerequisites:
Python 2.7.13 · Metasploit (optional for payload generation) · Network access to target
nomisec
STUB
by viethdgit · poc
https://github.com/viethdgit/CVE-2017-0199
The repository contains only a minimal README with the CVE number and an author name, lacking any exploit code, technical details, or functional content. It appears to be a placeholder or incomplete submission.
Target:
Microsoft Office/WordPad (CVE-2017-0199)
No auth needed
nomisec
WORKING POC
by sUbc0ol · client-side
https://github.com/sUbc0ol/Microsoft-Word-CVE-2017-0199-
This repository contains a functional exploit for CVE-2017-0199, which leverages a Microsoft Word RCE vulnerability via an HTA handler. The script generates malicious RTF and HTA files designed to execute arbitrary commands, including a reverse shell payload.
Classification
Working Poc 95%
Target:
Microsoft Word (various versions)
No auth needed
Prerequisites:
Victim opens the malicious RTF file · Network connectivity for reverse shell
nomisec
STUB
by ryhanson · poc
https://github.com/ryhanson/CVE-2017-0199
The repository contains only a README.md file with minimal content (just the CVE identifier) and no exploit code or technical details. It appears to be a placeholder or incomplete repository.
Target:
unknown
No auth needed
metasploit
WORKING POC
EXCELLENT
by Haifei Li, ryHanson, wdormann, DidierStevens, vysec, Nixawk, sinn3r · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/office_word_hta.rb
This Metasploit module exploits CVE-2017-0199 by crafting a malicious RTF file that triggers an OLE link to execute an HTA payload, leading to remote code execution on vulnerable Microsoft Office Word installations.
Classification
Working Poc 100%
Target:
Microsoft Office Word (versions prior to the April 2017 patch)
No auth needed
Prerequisites:
Vulnerable version of Microsoft Office Word · User interaction to open the malicious RTF file
patchapalooza
WORKING POC
by mirrors_bhdresh · poc
https://gitee.com/mirrors_bhdresh/CVE-2017-0199
This repository contains a functional Python script that generates malicious RTF/PPSX files to exploit CVE-2017-0199, a Microsoft Office RCE vulnerability. The toolkit supports multiple attack scenarios, including local and remote payload delivery, and integrates with Metasploit for post-exploitation.
Classification
Working Poc 95%
Target:
Microsoft Office (RTF/PPSX parsing)
No auth needed
Prerequisites:
Python 2.7.13 · Metasploit (optional for payload generation) · Network access to deliver payloads
patchapalooza
WORKING POC
by Djangoat · remote
https://gitlab.com/Djangoat/cve-2017-0199-py-kit
This repository contains a functional Python-based exploit toolkit for CVE-2017-0199, a Microsoft Office RCE vulnerability. It includes both generation and exploitation modes for malicious RTF/PPSX files, with options for obfuscation and payload delivery.
Classification
Working Poc 95%
Target:
Microsoft Office (various versions)
No auth needed
Prerequisites:
attacker-controlled server to host payloads · victim interaction to open malicious file