module
Druva inSync inSyncCPHwnet64.exe RPC Type 5 Privilege Escalation
Disclosed | Created |
---|---|
Feb 25, 2020 | May 13, 2020 |
Disclosed
Feb 25, 2020
Created
May 13, 2020
Description
Druva inSync client for Windows exposes a network service on TCP
port 6064 on the local network interface. inSync versions 6.6.3
and prior do not properly validate user-supplied program paths
in RPC type 5 messages, allowing execution of arbitrary commands
as SYSTEM.
This module has been tested successfully on inSync versions
6.5.2r99097 and 6.6.3r102156 on Windows 7 SP1 (x64).
port 6064 on the local network interface. inSync versions 6.6.3
and prior do not properly validate user-supplied program paths
in RPC type 5 messages, allowing execution of arbitrary commands
as SYSTEM.
This module has been tested successfully on inSync versions
6.5.2r99097 and 6.6.3r102156 on Windows 7 SP1 (x64).
Authors
Chris Lyne
Matteo Malvica
bcoles bcoles@gmail.com
Matteo Malvica
bcoles bcoles@gmail.com
Platform
Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.