POC详情: 6257be54916034fa744542ab975b8db6a225e7b2

来源
关联漏洞
标题: Microsoft Lightweight Directory Access Protocol 缓冲区错误漏洞 (CVE-2024-49113)
描述:Microsoft Lightweight Directory Access Protocol(LDAP)是美国微软(Microsoft)公司的一种目录服务协议,在 TCP/IP 堆栈之上的层上运行。 Microsoft Lightweight Directory Access Protocol存在缓冲区错误漏洞。攻击者利用该漏洞导致系统拒绝服务。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 f
描述
SafeBreaches CVE-2024-49113 POC(LdapNightmare) Integrated into Metasploit
介绍
# metasploit-ldapnightmare
SafeBreaches CVE-2024-49113 POC(LdapNightmare) Integrated into Metasploit

## Overview

This module implements CVE-2024-49113, a critical vulnerability in the Windows LDAP client that can cause system instability. The module integrates with the Metasploit Framework, providing a reliable way to test system resilience against this vulnerability.

## Features

- Full Metasploit Framework integration
- Asynchronous LDAP server implementation
- Configurable parameters for testing different scenarios
- Detailed logging and status reporting
- Built-in safety checks and dependency verification

## Requirements

- Python 3.5 or newer
- Metasploit Framework
- Required Python packages:
  ```
  ldaptor
  impacket
  ```

## Installation

1. Install the required Python packages:
   ```bash
   pip install -r requirements.txt
   ```

2. Place the module in your Metasploit modules directory:
   ```bash
   cp ldapnightmare.py /path/to/metasploit/modules/auxiliary/dos/windows/ldap/
   ```

3. Ensure the module is executable:
   ```bash
   chmod +x ldapnightmare.py
   ```

## Usage

### Within Metasploit Framework:

1. Start msfconsole:
   ```bash
   msfconsole
   ```

2. Load and configure the module:
   ```
   use auxiliary/dos/windows/ldap/ldapnightmare
   set RHOSTS target_ip
   set RPORT 49664
   set LPORT 389
   set DOMAINNAME yourdomain.com
   run
   ```

### Configuration Options

- `RHOSTS` - Target address (required)
- `RPORT` - Target port for RPC (default: 49664)
- `LPORT` - Local port for LDAP server (default: 389)
- `DOMAINNAME` - Attacker's domain name (required). This domain must have specific DNS SRV records configured (see Domain Configuration below)
- `ACCOUNT` - Target account name (default: Administrator)
- `SITENAME` - Target site name (default: empty)

### Domain Configuration

The `DOMAINNAME` parameter requires specific DNS SRV records to be configured. The domain must have two SRV records under it:

1. `ldap.tcp.dc._msdcs.domain_name` → `listen_port attacker's_machine_hostname`
2. `ldap.tcp.default-first-site-name._sites.dc._msdcs.domain_name` → `listen_port attacker's_machine_hostname`

**Important Note**: The attacker's machine hostname will work only if the victim server can resolve it using NBNS. Alternatively, you can replace the hostname with a domain name that points to the IP address of your LDAP server.

## Technical Details

The module operates in three main stages:

1. Sets up an asynchronous LDAP server to handle incoming connections
2. Initiates a DsrGetDcNameEx2 RPC call to trigger LDAP client behavior
3. Sends a specially crafted LDAP response to demonstrate the vulnerability

## Credits

- Original Research: SafeBreach Labs
- Authors: Or Yair, Shahak Morag
- Metasploit Integration: 0xMetr0

## References

- [SafeBreach Labs CVE-2024-49113 Research](https://github.com/SafeBreach-Labs/CVE-2024-49113)
- [CVE-2024-49113 Details](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49113)

## Disclaimer

This module is intended for authorized security testing and research purposes only. Users must obtain proper authorization before testing any systems they don't own or have permission to test.

## License

This module is released under the BSD 3-Clause License.

This work contains code derived from:
- SafeBreach Labs' original PoC (BSD 3-Clause License)
- Metasploit Framework (MSF_LICENSE - BSD 3-Clause License)

Full license texts can be found in the `LICENSES` file.
文件快照

[4.0K] /data/pocs/6257be54916034fa744542ab975b8db6a225e7b2 ├── [9.6K] ldapnightmare.py ├── [1.5K] LICENSE ├── [ 68K] LICENSES └── [3.4K] README.md 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。