module

McAfee SaaS MyCioScan ShowReport Remote Command Execution

Disclosed
2012-01-12
Created
2018-05-30

Description

This module exploits a vulnerability found in McAfee Security-as-a-Service.
The ShowReport() function (located in the myCIOScn.dll ActiveX component) fails
to check the FileName argument, and passes it on to a ShellExecuteW() function,
therefore allows any malicious attacker to execute any process that's on the
local system. However, if the victim machine is connected to a remote share
(or something similar), then it's also possible to execute arbitrary code.
Please note that a custom template is required for the payload, because the
default Metasploit template is detectable by McAfee -- any Windows binary, such
as calc.exe or notepad.exe, should bypass McAfee fine.

Authors

rgod
sinn3r sinn3r@metasploit.com

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/fileformat/mcafee_showreport_exec
msf exploit(mcafee_showreport_exec) > show targets
...targets...
msf exploit(mcafee_showreport_exec) > set TARGET < target-id >
msf exploit(mcafee_showreport_exec) > show options
...show and set options...
msf exploit(mcafee_showreport_exec) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.