Hello aspiring ethical hackers. In this article, you will learn about Follina vulnerability, a critical zero-day vulnerability discovered in Microsoft Office in 2022.

About the vulnerability
Follina tracked with CVE-ID CVE-2022-30190 is the name given to a remote code execution (RCE) vulnerability in Microsoft Office and Microsoft Support Diagnostic Tool (MSDT). Microsoft Support Diagnostic Tool (MSDT) is a service used for gathering diagnostic data about the system.
Follina is the name of a municipality that is located 60 kms northwest of Venice in Italy. Completely unrelated, the vulnerability has been named Follina as the malicious file was referencing to an executable that was named 0438. This is the area code of Follina, hence the zero-day has been named so.
A link to a HTML file on remote target that uses the ms-msdt: protocol handler is placed in a specially crafted Word document (.docx). When this .docx file is opened (or sometimes just previewed), the document causes Word to load and execute the malicious MSDT payload. This bypasses many traditional security defenses (like macros being disabled) and no user interaction beyond opening the file is necessary in some cases.
This vulnerability allows a remote attacker to use a Microsoft Office document template to execute code via MSDT and download a malicious payload from a remote URL. It affects Office 2013, 2016, 2019, 2021, Office ProPlus and Office 365.
Mitigation and Patches
Microsoft initially suggested a workaround and later released a patch for this vulnerability in June 2022 (via Windows Update).
Proof Of Concept
Let’s see PoC exploit for Follina practically. We are doing this on Klai Linux. For this let’s download a exploit from GitHub. Navigate into the cloned directory and you will see files as shown below.
Two files are important in this directory. The “clickme.docx” is the file that uses MSDT to connect to a remote website and execute the exploit. The exploit is present in the “exploit.html” file. If this POC is successful, the exploit will popup calc.exe.
I tested this exploit on MS Office 2019 running on Windows 10. I hosted the exploit using WAMP server running on localhost.
I opened the clickme.doc and waited. Nothing happened. Then I saved it as clickme.rtf file as shown below.
This time when I clicked on clickme.rtf file, this happened,
And the calculator popped up. The Proof Of Concept Is successful.
































