关联漏洞
Description
Flexense HTTP Server <= 10.6.24 - Denial Of Service Exploit
介绍
# Flexense HTTP Server <= 10.6.24 - Denial Of Service Vulnerability
# Exploit Title: Flexense HTTP Server <= 10.6.24 - Denial Of Service Vulnerability
# Date: 03-09-2018
# Exploit Author: Ege Balcı
# Vendor Homepage: http://www.syncbreeze.com
# Software Link: https://github.com/EgeBalci/Sync_Breeze_Enterprise_10_6_24_-DOS/raw/master/syncbreezeent_setup_v10.6.24.exe
# Version: 10.6.24
# Tested on: Windows 7/10
# CVE: 2018-8065
This module triggers a Denial of Service vulnerability in the Sync Flexense HTTP Server . After installing the software, web server should be enabled via Options->Server->Enable web server on port. Module triggers a user space write access violation on syncbrs.exe memory region. Number of requests that will crash the server changes between 200-1000 depending on the OS version and system memory. Sync Breeze Enterprise 10.6.24 version reportedly vulnerable.
# Exploits
[MSF Module](https://github.com/EgeBalci/Flexense_HTTP_Server_DOS/blob/master/flexense_http_server_dos.rb) <br>
[PYTHON](https://github.com/EgeBalci/Flexense_HTTP_Server_DOS/blob/master/dos.py)
文件快照
[4.0K] /data/pocs/2c19adc7fc1ee1e9fde3c2ce86d4eb3872a59fb1
├── [1.2K] dos.py
├── [2.2K] flexense_http_server_dos.md
├── [2.2K] flexense_http_server_dos.rb
├── [1.0K] LICENSE
└── [1.1K] README.md
0 directories, 5 files
备注
1. 建议优先通过来源进行访问。
2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →