InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties…

Follow publication

Member-only story

Moniker Link (CVE-2024–21413) | TryHackMe Walkthrough by Mark de Moras

Mark de Moras
InfoSec Write-ups
Published in
5 min readFeb 23, 2024

--

Hey everyone!

This is a writeup to the TryHackMe Moniker Link room, which can be found here. In this TryHackMe write-up, I will first explain the Moniker Link exploit, how it works, and some of its features. I will then provide a walkthrough of the TryHackMe room with the answers to the prompted questions. Have fun!

What is the Moniker Link (CVE-2024–21413) exploit, and how does it work?

The Moniker Link exploit is a vulnerability in the popular email client, Microsoft Outlook. The vulnerability was categorized as Critical, having a CVSS rating of 9.8/10. It works by bypassing Outlook’s Protected View option, a feature that limits us to read access, thus preventing malicious scripts like macros from running on the system. The file:// parameter in the underlying hyperlink attempts to access a specified file share, and the ~ symbol, along with some additional text, permits this exploit to function. An example from TryHackMe is provided below:

At the time of this write-up, it is stated that remote code execution (RCE) is possible, thus explaining the incredibly high severity rating, but there is no proof that RCE is possible.

What “Severity” rating has the CVE been assigned?

--

--

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Mark de Moras

🔐 Cybersecurity Student & Content Creator | 📚 Helping Future Pros Ace Security+ | Practice Exams -> https://bit.ly/cybermdmm

No responses yet

Write a response