Rapid7 Vulnerability & Exploit Database

MS10-104 Microsoft Office SharePoint Server 2007 Remote Code Execution

Back to Search

MS10-104 Microsoft Office SharePoint Server 2007 Remote Code Execution

Disclosed
12/14/2010
Created
05/30/2018

Description

This module exploits a vulnerability found in SharePoint Server 2007 SP2. The software contains a directory traversal, that allows a remote attacker to write arbitrary files to the filesystem, sending a specially crafted SOAP ConvertFile request to the Office Document Conversions Launcher Service, which results in code execution under the context of 'SYSTEM'. The module uses the Windows Management Instrumentation service to execute an arbitrary payload on vulnerable installations of SharePoint on Windows 2003 Servers. It has been successfully tested on Office SharePoint Server 2007 SP2 over Windows 2003 SP2.

Author(s)

  • Oleksandr Mirosh
  • James Burton
  • juan vazquez <juan.vazquez@metasploit.com>

Platform

Windows

Development

References

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/misc/ms10_104_sharepoint
msf exploit(ms10_104_sharepoint) > show targets
    ...targets...
msf exploit(ms10_104_sharepoint) > set TARGET < target-id >
msf exploit(ms10_104_sharepoint) > show options
    ...show and set options...
msf exploit(ms10_104_sharepoint) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;