Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-8065 PoC — Flexense SyncBreeze Enterprise Web服务器安全漏洞

Source
Associated Vulnerability
Title:Flexense SyncBreeze Enterprise Web服务器安全漏洞 (CVE-2018-8065)
Description:Flexense SyncBreeze Enterprise是加拿大Flexense公司的一套文件同步工具。该工具具有文件管理和数据同步等功能。Web server是其中的一个Web服务器。 Flexense SyncBreeze Enterprise 10.6.24版本中的Web服务器存在安全漏洞。攻击者可通过快速发送带有较长HTTP请求包头的各类HTTP请求或较长的URIs利用该漏洞造成拒绝服务。
Description
Flexense HTTP Server <= 10.6.24 - Denial Of Service Exploit
Readme
# Flexense HTTP Server <= 10.6.24 - Denial Of Service Vulnerability

        # Exploit Title: Flexense HTTP Server <= 10.6.24 - Denial Of Service Vulnerability
        # Date: 03-09-2018
        # Exploit Author: Ege Balcı
        # Vendor Homepage: http://www.syncbreeze.com
        # Software Link: https://github.com/EgeBalci/Sync_Breeze_Enterprise_10_6_24_-DOS/raw/master/syncbreezeent_setup_v10.6.24.exe
        # Version: 10.6.24
        # Tested on: Windows 7/10
        # CVE: 2018-8065


This module triggers a Denial of Service vulnerability in the Sync Flexense HTTP Server . After installing the software, web server should be enabled via Options->Server->Enable web server on port. Module triggers a user space write access violation on syncbrs.exe memory region. Number of requests that will crash the server changes between 200-1000 depending on the OS version and system memory. Sync Breeze Enterprise 10.6.24 version reportedly vulnerable.

# Exploits

[MSF Module](https://github.com/EgeBalci/Flexense_HTTP_Server_DOS/blob/master/flexense_http_server_dos.rb) <br>
[PYTHON](https://github.com/EgeBalci/Flexense_HTTP_Server_DOS/blob/master/dos.py)
File Snapshot

[4.0K] /data/pocs/2c19adc7fc1ee1e9fde3c2ce86d4eb3872a59fb1 ├── [1.2K] dos.py ├── [2.2K] flexense_http_server_dos.md ├── [2.2K] flexense_http_server_dos.rb ├── [1.0K] LICENSE └── [1.1K] README.md 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.