I tested the exploit in the home environment by using Xampp web server with HTML script at Localhost location. The document is opened with the Word notification: "This document contains links that may refer to other files (...). If I allow updating links (Word 2019) then the msdt.exe is executed as a child process of Word (also sdiagnhost.exe is executed). If I do not allow updating links, then nothing happens (msdt.exe is not executed). If I correctly understand this exploit, then such notification should appear on Word's default settings when a default Word setting is enabled (Update automatic links at open)
In all examples available on the web this notification about embedded links is absent.
Is this behavior related to the design of your POC, or maybe there can be another reason?
Hi
I tested the exploit in the home environment by using Xampp web server with HTML script at Localhost location. The document is opened with the Word notification: "This document contains links that may refer to other files (...). If I allow updating links (Word 2019) then the msdt.exe is executed as a child process of Word (also sdiagnhost.exe is executed). If I do not allow updating links, then nothing happens (msdt.exe is not executed). If I correctly understand this exploit, then such notification should appear on Word's default settings when a default Word setting is enabled (Update automatic links at open)
In all examples available on the web this notification about embedded links is absent. Is this behavior related to the design of your POC, or maybe there can be another reason?
Thank you.