Vulnerability & Exploit Database

Back to search

Microsoft Office Word Malicious Macro Execution

This module injects a malicious macro into a Microsoft Office Word document (docx). The comments field in the metadata is injected with a Base64 encoded payload, which will be decoded by the macro and execute as a Windows executable. For a successful attack, the victim is required to manually enable macro execution.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/multi/fileformat/office_word_macro

Authors

  • sinn3r <sinn3r [at] metasploit.com>

References

Targets

  • Microsoft Office Word on Windows
  • Microsoft Office Word on Mac OS X (Python)

Platforms

  • windows
  • python

Architectures

  • python

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/multi/fileformat/office_word_macro msf exploit(office_word_macro) > show targets ...targets... msf exploit(office_word_macro) > set TARGET <target-id> msf exploit(office_word_macro) > show options ...show and set options... msf exploit(office_word_macro) > exploit