Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-15950 PoC — Flexense SyncBreeze Enterprise 缓冲区错误漏洞

Source
Associated Vulnerability
Title:Flexense SyncBreeze Enterprise 缓冲区错误漏洞 (CVE-2017-15950)
Description:Flexense SyncBreeze Enterprise是加拿大Flexense公司的一套文件同步工具。该工具具有文件管理和数据同步等功能。 Flexense SyncBreeze Enterprise 10.1.16版本中存在缓冲区溢出漏洞。攻击者可通过向Destination directory字段提交较长的输入利用该漏洞执行任意代码。
Readme
# CVE-2017-15950

PoC exploit for vulnerability CVE-2017-15950 SyncBreeze XML Parser and/or Sync functionality Stack-Based Buffer Overflow.

## Usage

When running the XML payload generator, the script will output a XML file **xplSyncBreeze.xml** containing the payload to import using SyncBreeze.

```bash
python3 payloadgenerator_XML_CVE-2017-15950.py
```

When running the default payload generator, the script will output a TXT file **POCPayload.txt** containing the payload to insert into Sync functionality Destination PATH or Source PATH fields.

```bash
python3 payloadgenerator_CVE-2017-15950.py
```

## Acknowledgments

Exploits developed with Filipe Oliveira and Toronto Garcez.
File Snapshot

[4.0K] /data/pocs/07cf132fbd1a9361879e537b413b55d4ac4eeb36 ├── [ 34K] LICENSE ├── [4.3K] payloadgenerator_CVE-2017-15950.py ├── [3.6K] payloadgenerator_XML_CVE-2017-15950.py └── [ 690] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.