This Metasploit module exploits a remote arbitrary file write vulnerability in SolidWorks Workgroup PDM 2014 SP2 and prior. For targets running Windows Vista or newer the payload is written to the startup folder for all users and executed upon next user logon. For targets before Windows Vista code execution can be achieved by first uploading the payload as an exe file, and then upload another mof file, which schedules WMI to execute the uploaded payload. This Metasploit module has been tested successfully on SolidWorks Workgroup PDM 2011 SP0 on Windows XP SP3 (EN) and Windows 7 SP1 (EN).
555ceedf2a25fd70fef94c9ae70c8626ff642d286be5b686e2bf20bc82d0820a
SolidWorks Workgroup PDM 2014 SP2 suffers from an arbitrary file write vulnerability.
5031db0895f8f86ccfac8994d8fada3d4c9910fce53ab7ccc8b1fed2ed1b9fb1
Dassault Systemes Catia V5-6R2013 "CATV5_Backbone_Bus" stack buffer overflow exploit.
b9c312295d8a073944dc628dace9c57b37d1c0999e861122190110bb6b4e4bd6
SolidWorks Workgroup PDM 2014 SP2 Opcode 2001 suffers from a stack buffer overflow vulnerability.
b53b0842f06abd5f681b92c8635f73be4d64f335c2f4519000c78f057c047e85
Dassault Systemes Catia V5-6R2013 "CATV5_AllApplications" stack buffer overflow exploit.
1be0352867ab66e7dea0e60aee325461d7ff44a486cd22b219ee5c8f24f398d3