nomisec
WORKING POC
347 stars
by api0cradle · remote-auth
https://github.com/api0cradle/CVE-2023-23397-POC-Powershell
This repository contains a functional PowerShell script that exploits CVE-2023-23397, an NTLM credential leakage vulnerability in Microsoft Outlook. The script uses the Outlook COM object to create calendar invitations with a malicious `ReminderSoundFile` path, triggering NTLM authentication leaks to attacker-controlled servers.
Classification
Working Poc 100%
Target:
Microsoft Outlook (versions affected by CVE-2023-23397)
Auth required
Prerequisites:
Outlook installed on Windows · Valid recipient email address · Attacker-controlled SMB/HTTP server to capture NTLM hashes
nomisec
STUB
160 stars
by sqrtZeroKnowledge · infoleak
https://github.com/sqrtZeroKnowledge/CVE-2023-23397_EXPLOIT_0DAY
The repository contains partial code for a .NET library (MsgKit) related to email and appointment handling, but lacks any exploit-specific implementation or proof-of-concept for CVE-2023-23397. No malicious or functional exploit code is present.
Target:
Unknown (no exploit code present)
No auth needed
nomisec
WORKING POC
127 stars
by Trackflaw · client-side
https://github.com/Trackflaw/CVE-2023-23397
This repository contains a functional PoC for CVE-2023-23397, which exploits a vulnerability in Microsoft Outlook's handling of appointment reminders to trigger an NTLM authentication request to an attacker-controlled server. The script generates a malicious .msg file and sends it via SMTP, leveraging the zero-click nature of the vulnerability.
Classification
Working Poc 95%
Target:
Microsoft Outlook (thick client)
No auth needed
Prerequisites:
SMTP server access · Attacker-controlled SMB server
nomisec
WORKING POC
39 stars
by ka7ana · local
https://github.com/ka7ana/CVE-2023-23397
This PowerShell script exploits CVE-2023-23397 by creating a malicious Outlook meeting invite with a UNC path in the ReminderSoundFile property, triggering an SMB/WebDAV connection attempt that can leak Net-NTLMv2 hashes.
Classification
Working Poc 95%
Target:
Microsoft Outlook (versions affected by CVE-2023-23397)
Auth required
Prerequisites:
Access to send emails to the target · SMB/WebDAV server to capture hashes
nomisec
WORKING POC
25 stars
by tiepologian · client-side
https://github.com/tiepologian/CVE-2023-23397
This repository contains a functional Python exploit for CVE-2023-23397, an Outlook privilege escalation vulnerability. The exploit generates a malicious Outlook appointment item that triggers NTLM credential theft via a crafted SMB server path in the reminder sound file field.
Classification
Working Poc 95%
Target:
Microsoft Outlook (Office/365)
Auth required
Prerequisites:
Outlook installed on target system · SMB server controlled by attacker · Valid target email address
nomisec
WORKING POC
22 stars
by Muhammad-Ali007 · remote-auth
https://github.com/Muhammad-Ali007/OutlookNTLM_CVE-2023-23397
The repository contains a functional PowerShell script that exploits CVE-2023-23397, an NTLM credential leak vulnerability in Microsoft Outlook. The exploit crafts a malicious calendar invitation with a UNC path to a remote SMB share, triggering an NTLM authentication attempt when the victim interacts with the invitation.
Classification
Working Poc 100%
Target:
Microsoft Outlook (versions affected by CVE-2023-23397)
No auth needed
Prerequisites:
Attacker-controlled SMB share or WebDAV server · Victim interaction with the malicious calendar invitation
nomisec
WORKING POC
14 stars
by BronzeBee · client-side
https://github.com/BronzeBee/cve-2023-23397
This repository contains a functional Python script that exploits CVE-2023-23397, a Microsoft Outlook vulnerability, by crafting TNEF-encoded emails to trigger malicious meeting reminders. The exploit leverages SMTP to send payloads that abuse the `IPM.TaskRequest` message class, bypassing the need for COM objects or EWS.
Classification
Working Poc 95%
Target:
Microsoft Outlook (tested on Outlook365 16130.20218 and Outlook 2019 10395.20020)
No auth needed
Prerequisites:
SMTP relay access · Target email address · Network access to the target
nomisec
WORKING POC
9 stars
by djackreuter · client-side
https://github.com/djackreuter/CVE-2023-23397-PoC
This repository contains a functional C# exploit for CVE-2023-23397, which leverages a vulnerability in Microsoft Outlook to trigger arbitrary code execution via a crafted appointment with a malicious UNC path. The PoC automates the creation and sending of a malicious meeting invite using Outlook's COM interface.
Classification
Working Poc 95%
Target:
Microsoft Outlook (versions affected by CVE-2023-23397)
Auth required
Prerequisites:
Access to a vulnerable Outlook client · Valid recipient email address · UNC path pointing to a malicious SMB server
nomisec
WORKING POC
7 stars
by BillSkiCO · client-side
https://github.com/BillSkiCO/CVE-2023-23397_EXPLOIT
This repository contains a functional Python script that exploits CVE-2023-23397 by sending a crafted meeting request via Microsoft Outlook, which triggers an SMB connection to a malicious UNC path when the reminder is activated, potentially leaking Net-NTLMv2 hashes.
Classification
Working Poc 95%
Target:
Microsoft Outlook (versions affected by CVE-2023-23397)
Auth required
Prerequisites:
Access to a vulnerable Outlook client · Ability to send emails to the target · Control over an SMB/WebDAV server to capture hashes
nomisec
WORKING POC
7 stars
by vlad-a-man · client-side
https://github.com/vlad-a-man/CVE-2023-23397
This repository contains a functional Python exploit for CVE-2023-23397, which leverages a vulnerability in Microsoft Outlook to leak Net-NTLMv2 hashes via a crafted email with a malicious UNC path in the PidLidReminderFileParameter property.
Classification
Working Poc 95%
Target:
Microsoft Outlook (versions affected by CVE-2023-23397)
No auth needed
Prerequisites:
Python 3 · pywin32 package · Attacker-controlled SMB server
nomisec
WORKING POC
6 stars
by ahmedkhlief · client-side
https://github.com/ahmedkhlief/CVE-2023-23397-POC
This repository contains a functional proof-of-concept exploit for CVE-2023-23397, a Microsoft Outlook elevation of privilege vulnerability. The exploit leverages a malicious appointment file with a crafted `PidLidReminderFileParameter` property to trigger a UNC path injection, leading to NTLM credential theft or arbitrary code execution.
Classification
Working Poc 95%
Target:
Microsoft Outlook (versions affected by CVE-2023-23397)
No auth needed
Prerequisites:
Ability to deliver a malicious .msg file to the target · Target must open the appointment in Outlook
nomisec
WORKING POC
4 stars
by grn-bogo · infoleak
https://github.com/grn-bogo/CVE-2023-23397
This PoC generates a malicious .msg file exploiting CVE-2023-23397 by setting a UNC path in the reminder_sound_file field, which triggers NTLM authentication to an attacker-controlled server when the file is opened in Microsoft Outlook.
Classification
Working Poc 90%
Target:
Microsoft Outlook (versions affected by CVE-2023-23397)
No auth needed
Prerequisites:
Attacker-controlled SMB server · Victim opens the malicious .msg file in Outlook
nomisec
WORKING POC
4 stars
by Pushkarup · remote
https://github.com/Pushkarup/CVE-2023-23397
The repository contains a functional Python script that exploits CVE-2023-23397, an elevation of privilege vulnerability in Microsoft Outlook. The exploit generates a malicious email with a UNC path to an attacker-controlled SMB share, triggering NTLM hash leakage when the email is opened.
Classification
Working Poc 95%
Target:
Microsoft Outlook for Windows (all supported versions)
No auth needed
Prerequisites:
Python 3.x · win32com.client · Outlook installed on the target system
nomisec
WORKING POC
3 stars
by P4x1s · poc
https://github.com/P4x1s/CVE-2023-23397-POC
This PoC exploits CVE-2023-23397 by sending a malicious appointment via email, triggering NetNTLM authentication. It uses the `independentsoft.msg` library to craft a malicious `.msg` file with a manipulated reminder sound file path.
Classification
Working Poc 90%
Target:
Microsoft Outlook (versions affected by CVE-2023-23397)
Auth required
Prerequisites:
Valid SMTP credentials · Target email address · Network access to SMTP server
nomisec
WORKING POC
3 stars
by alicangnll · poc
https://github.com/alicangnll/CVE-2023-23397
This repository contains functional exploit code for CVE-2023-23397, a vulnerability in Microsoft Outlook. The provided code includes classes for handling email addresses, appointments, and other Outlook-related functionalities, which are likely used to craft malicious messages exploiting the vulnerability.
Classification
Working Poc 90%
Target:
Microsoft Outlook
No auth needed
Prerequisites:
Ability to send crafted emails to the target
nomisec
WORKING POC
2 stars
by ahmedkhlief · client-side
https://github.com/ahmedkhlief/CVE-2023-23397-POC-Using-Interop-Outlook
This repository contains a functional proof-of-concept exploit for CVE-2023-23397, leveraging Microsoft Outlook's Interop to trigger a vulnerability via a crafted appointment with a malicious reminder sound file path. The PoC demonstrates the exploit by setting a UNC path to an attacker-controlled server, which could lead to NTLM hash leakage or further exploitation.
Classification
Working Poc 90%
Target:
Microsoft Outlook (versions affected by CVE-2023-23397)
Auth required
Prerequisites:
Access to a vulnerable Outlook instance · Ability to create appointments · Network access to a controlled UNC path
nomisec
WORKING POC
1 stars
by Phaedrik · remote-auth
https://github.com/Phaedrik/CVE-2023-23397-POC
The repository contains functional PoC scripts (PowerShell and Python) that exploit CVE-2023-23397, an NTLM relay vulnerability in Microsoft Outlook. The scripts send crafted meeting requests with malicious reminder sound file paths to trigger NTLM authentication leaks.
Classification
Working Poc 95%
Target:
Microsoft Outlook (versions affected by CVE-2023-23397)
Auth required
Prerequisites:
Compromised Outlook email account · Access to a Windows host with Outlook installed (for PowerShell PoC)
nomisec
SCANNER
1 stars
by SecCTechs · poc
https://github.com/SecCTechs/CVE-2023-23397
The repository contains PowerShell scripts to detect and remediate CVE-2023-23397 by checking Microsoft Office versions and forcing updates if outdated. It does not include exploit code but provides detection and patching logic.
Classification
Scanner 90%
Target:
Microsoft Office (Click-to-Run versions)
Auth required
Prerequisites:
Local or administrative access to the target system · Microsoft Office installed via Click-to-Run
nomisec
WORKING POC
1 stars
by moneertv · poc
https://github.com/moneertv/CVE-2023-23397
This repository contains a functional C# PoC for CVE-2023-23397, which exploits a vulnerability in Microsoft Outlook by crafting a malicious appointment file with a UNC path in the `PidLidReminderFileParameter` property. The exploit generates a `.msg` file that triggers NTLM credential leakage when opened.
Classification
Working Poc 95%
Target:
Microsoft Outlook (versions affected by CVE-2023-23397)
No auth needed
Prerequisites:
MsgKit library · Ability to deliver the crafted `.msg` file to the target
nomisec
SCANNER
1 stars
by j0eyv · poc
https://github.com/j0eyv/CVE-2023-23397
The repository contains PowerShell scripts to detect and remediate vulnerable versions of Microsoft 365 Apps related to CVE-2023-23397. The scripts check registry keys for specific versions and trigger updates if a vulnerable version is found.
Classification
Scanner 90%
Target:
Microsoft 365 Apps (Outlook)
Auth required
Prerequisites:
Local administrative access to the target system · Microsoft 365 Apps installed
nomisec
WORKING POC
1 stars
by TheUnknownSoul · client-side
https://github.com/TheUnknownSoul/CVE-2023-23397-PoW
This repository contains a functional exploit for CVE-2023-23397, which targets Microsoft Outlook to retrieve NetNTLM hashes via a crafted appointment with a malicious SMB share link. The exploit automates the delivery of malicious appointments via SMTP.
Classification
Working Poc 90%
Target:
Microsoft Outlook 2016 (unpatched versions)
Auth required
Prerequisites:
SMB share with a malicious sound file · SMTP server credentials · List of target email recipients
nomisec
WORKING POC
by stevesec · client-side
https://github.com/stevesec/CVE-2023-23397
The PoC demonstrates CVE-2023-23397 by creating a malicious Outlook appointment that forces a connection to an attacker-controlled SMB server to leak NetNTLMv2 hashes. The PowerShell script automates the creation of a crafted appointment item with a remote sound file path.
Classification
Working Poc 95%
Target:
Microsoft Outlook (versions affected by CVE-2023-23397)
No auth needed
Prerequisites:
Attacker-controlled SMB server · Victim opens or receives the malicious email/appointment
nomisec
WORKING POC
by Gilospy · client-side
https://github.com/Gilospy/CVE-2023-23397
This repository contains a functional PowerShell script that exploits CVE-2023-23397, a zero-click NTLM relay vulnerability in Microsoft Outlook. The exploit sends a malicious calendar invite with a UNC path in the reminder sound file, triggering an NTLMv2 hash leak to an attacker-controlled server.
Classification
Working Poc 95%
Target:
Microsoft Outlook (2013, 2016, 2019, Microsoft 365 pre-March 2023 patch)
No auth needed
Prerequisites:
Attacker-controlled SMB server (e.g., Responder) · Network connectivity between victim and attacker · Outlook configured to process calendar invites
nomisec
WORKING POC
by Zeppperoni · poc
https://github.com/Zeppperoni/CVE-2023-23397-Patch
This repository contains a PowerShell script that patches CVE-2023-23397 by downloading and installing the relevant Microsoft security updates (KB5023696, KB5023706, KB5023702) if they are not already present on the system. The script checks the current Windows version and applies the appropriate patch.
Classification
Working Poc 90%
Target:
Microsoft Windows 10 and 11 (various versions)
Auth required
Prerequisites:
Administrative privileges to install updates · Internet access to download patches
nomisec
WRITEUP
by Cyb3rMaddy · poc
https://github.com/Cyb3rMaddy/CVE-2023-23397-Report
The repository provides a technical description of CVE-2023-23397, an Elevation of Privilege (EoP) vulnerability in Microsoft Outlook. It explains the attack mechanism involving a crafted email with a UNC path to an SMB share, leading to NTLM credential theft without user interaction.
Classification
Writeup 80%
Target:
Microsoft Outlook
No auth needed
Prerequisites:
Ability to send emails to the target · Control over an SMB server for NTLM relay
nomisec
WRITEUP
by im007 · poc
https://github.com/im007/CVE-2023-23397
This repository provides PowerShell scripts for evaluating and remediating CVE-2023-23397, a vulnerability in Microsoft Office. The scripts check the installed version of Office and force an update if the system is not patched.
Classification
Writeup 90%
Target:
Microsoft Office (various versions)
Auth required
Prerequisites:
Administrative access to run PowerShell scripts · Microsoft Office installed on the target system
nomisec
WRITEUP
by Symbolexe · poc
https://github.com/Symbolexe/CVE-2023-23397
This repository provides a detailed technical analysis of CVE-2023-23397, a use-after-free vulnerability in Microsoft Outlook that leads to remote code execution. It explains the vulnerability mechanics, exploitation scenarios, and mitigation steps but does not include functional exploit code.
Classification
Writeup 90%
Target:
Microsoft Outlook (versions prior to April 2023 Patch Tuesday)
No auth needed
Prerequisites:
Crafted malicious email with a specially designed object · User interaction (opening/previewing the email)
nomisec
WORKING POC
by jacquesquail · client-side
https://github.com/jacquesquail/CVE-2023-23397
This repository contains a functional PowerShell PoC for CVE-2023-23397, which exploits a vulnerability in Microsoft Outlook by sending a crafted meeting invitation with a malicious UNC path in the reminder sound file. The exploit triggers an NTLM authentication request to an attacker-controlled server when the reminder is activated.
Classification
Working Poc 95%
Target:
Microsoft Outlook (versions affected by CVE-2023-23397)
Auth required
Prerequisites:
Outlook installed on victim machine · Victim must open or interact with the meeting invitation · Attacker-controlled UNC path
patchapalooza
WORKING POC
by asocsam · client-side
https://github.com/asocsam/offensive-red-team-projects
This repository contains a functional exploit PoC for CVE-2023-23397 (Outlook NTLM leak) along with a Docker-based lab environment for replication. The exploit includes a Python-based ICS generator and listener to trigger and capture NTLM hashes via crafted emails.
Classification
Working Poc 95%
Target:
Microsoft Outlook
No auth needed
Prerequisites:
Docker environment · Python 3.x · Network access to target Outlook client
patchapalooza
WORKING POC
by smnelson128 · client-side
https://gitlab.com/smnelson128/CVE-2023-23397
This repository contains a functional PowerShell script that exploits CVE-2023-23397, a zero-click vulnerability in Microsoft Outlook. The exploit forces a victim to connect to an attacker-controlled server via a crafted calendar reminder, leaking NetNTLMv2 hashes through an SMB request.
Classification
Working Poc 95%
Target:
Microsoft Outlook (versions affected by CVE-2023-23397)
No auth needed
Prerequisites:
Attacker-controlled SMB server · Victim opens or receives the crafted calendar item