module

McAfee SaaS MyCioScan ShowReport Remote Command Execution

Disclosed
Jan 12, 2012
Created
May 30, 2018

Description

This module exploits a vulnerability found in McAfee Security-as-a-Service.
The ShowReport() function (located in the myCIOScn.dll ActiveX component) fails
to check the FileName argument, and passes it on to a ShellExecuteW() function,
therefore allows any malicious attacker to execute any process that's on the
local system. However, if the victim machine is connected to a remote share
(or something similar), then it's also possible to execute arbitrary code.
Please note that a custom template is required for the payload, because the
default Metasploit template is detectable by McAfee -- any Windows binary, such
as calc.exe or notepad.exe, should bypass McAfee fine.

Authors

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/windows/fileformat/mcafee_showreport_exec
msf exploit(mcafee_showreport_exec) > show targets
...targets...
msf exploit(mcafee_showreport_exec) > set TARGET < target-id >
msf exploit(mcafee_showreport_exec) > show options
...show and set options...
msf exploit(mcafee_showreport_exec) > exploit

Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.