X
x
Scrabbl
Think beyond ordinary
Subscribe to our newsletter to explore all the corners of worldly happenings

MS Word Logical Bug Could Allow Hackers to Harm Your Computer

By using this vulnerability attacker can embed malicious code in the word file and this code will execute at runtime of the document.

MS Word Logical Bug Could Allow Hackers to Harm Your Computer

Cyber Security Researchers found Business Logical bug in the Microsoft Word version 2016 or older than that. By using this vulnerability attacker can embed malicious code in the word file and this code will execute at runtime of the document. The business logical bug is little different with the other severity vulnerabilities. Business logic vulnerabilities are methods of using the authorized processing flow or behavior of an application in a way that responses in a negative consequence to the organization.


Manish Kumawat, director at Cryptus Cyber Security Pvt Ltd, an organisation that provides Cyber Security Services, Corporate Training to the government and private organisations, said that when a user attaches an online YouTube video link to an MS Word file, the online video attach option automatically creates an HTML embed script code, which is executed when the thumbnail inside the document is clicked by the viewer which will be executed when user clicks on the video thumbnail in MS word document.


The document.xml file which is used for the attached code of embedded video link, that code can be replaced with a malicious code of javascript or HTML. In another way, an attacker can replace the original video code with a malicious code which will infect the victim system.


Discovered by researchers at Cymulate, the vulnerability affects the 'Online Video' feature in Word file, this option that allows users to attach an online YouTube Link. To prove the vulnerability, Cymulate researchers created a proof-of-concept attack, demonstrating how the malicious code infects the victim computer.


Cymulate researchers reported this bug, which impacts all users of MS Office 2016 and older versions, three months ago to Microsoft, but the company rejected to acknowledge it as a security bug, Kumawat pointed out.

Microsoft has no plans to patch this logical bug and says its software is "properly interpreting HTML as designed."