Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-17099 PoC — Flexense SyncBreeze Enterprise HTTP服务器缓冲区错误漏洞

Source
Associated Vulnerability
Title:Flexense SyncBreeze Enterprise HTTP服务器缓冲区错误漏洞 (CVE-2017-17099)
Description:Flexense SyncBreeze Enterprise是加拿大Flexense公司的一套文件同步工具。该工具具有文件管理和数据同步等功能。HTTP server是其中的一个HTTP服务器。 Flexense SyncBreeze Enterprise 10.1.16版本中的HTTP服务器存在缓冲区溢出漏洞。攻击者可借助较长GET请求利用该漏洞覆盖SHE记录并执行载荷。
Description
CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002
Readme
# Developed Exploits

This repository will contain any exploit or proof of concept code I release publicly. In addition to this, I will include Metasploit Modules, and ported exploits.

## Metasploit Modules

This directory will contain all Metasploit modules I've developed. Note that code within this directory may be a standalone PoC in another directory.

## Ported Exploits

Exploitation is one of the hardest skills to master as a Hacker. This directory will contain vulnerabilities I have not personally discovered, but instead re-created. In order to truly understand attacks, you must take apart an exploit and try to recreate it yourself. Keep in mind this repository only contains code published on other websites / blogs. I WILL NOT place every exploit I port here (would be a lot larger).
File Snapshot

[4.0K] /data/pocs/232172844818f73d7d1197ff84b14be4e3583040 ├── [1.0K] LICENSE.md ├── [4.0K] Metasploit-Modules │   ├── [8.1K] erlang_cookie_rce.rb │   ├── [5.5K] pfsense_graph_injection_exec.rb │   └── [5.3K] syncbreeze_bof.rb ├── [4.0K] Personal-Exploits │   ├── [4.0K] DELL EMC OneFS Storage Administration 8.1.2.0 - Authenticated RCE │   │   ├── [4.0K] images │   │   │   ├── [ 25K] admin-side.png │   │   │   ├── [ 47K] bruteforce.png │   │   │   ├── [ 23K] fssh.png │   │   │   ├── [ 42K] ftp-settings.png │   │   │   └── [ 24K] logged-in-shell.png │   │   ├── [2.8K] isilon-onefs-brute.py │   │   ├── [4.0K] isilon-onefs-ftp-exploit.py │   │   └── [3.8K] README.md │   ├── [4.0K] Nimsoft nimcontroller 7.80 - Unauthenticated RCE │   │   └── [ 35K] poc_release.c │   ├── [ 437] README.md │   ├── [4.0K] SyncBreeze Enterprise v10.1.16 - Unauthenticated RCE │   │   ├── [4.0K] images │   │   │   └── [292K] w00t.png │   │   ├── [ 533] README.md │   │   └── [5.3K] sploit-PoC.py │   ├── [4.0K] Sysdig Monitor - Kubernetes Post Exploitation │   │   ├── [4.6K] README.md │   │   └── [8.5K] sysdig_extract.py │   └── [4.0K] VXSearch v10.2.14 - Local Code Execution │   ├── [4.0K] images │   │   └── [107K] Proof.png │   ├── [ 319] README.md │   └── [ 11K] vxSearchSploitWin7.py ├── [4.0K] Ported-Exploits │   ├── [2.0K] allok-exploit.py │   ├── [3.8K] CVE-2003-0727.py │   ├── [3.6K] CVE-2006-6184.py │   ├── [4.9K] CVE-2017-18047.py │   ├── [4.5K] CVE-2019-1003000_CVE-2018-1999002_exploit_chain.py │   ├── [4.2K] mysql_UDF_pwnage.py │   └── [3.2K] webdav_exploit.py └── [ 802] README.md 11 directories, 30 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.