Skip to content

Commit 24a86cd

Browse files
committed
Refactoring based on comments
1 parent f667179 commit 24a86cd

File tree

2 files changed

+3
-8
lines changed

2 files changed

+3
-8
lines changed

documentation/modules/exploit/windows/local/linqpad_deserialization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Steps:
1010
3. Get Meterpreter/cmd shell
1111
4. Run: `use windows/local/linqpad_deserialization`
1212
5. Set payload - for example `set payload cmd/windows/generic` - and corresponding parameters
13-
5. Set parameters `session`, `cache_path`, `linqpad_path`
13+
5. Set parameters `session`, `cache_path`, `linqpad_path`, `cleanup`
1414
6. Run exploit
1515

1616
## Options

modules/exploits/windows/local/linqpad_deserialization_persistence.rb

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -16,10 +16,6 @@ def initialize(info = {})
1616
super(
1717
update_info(
1818
info,
19-
# The Name should be just like the line of a Git commit - software name,
20-
# vuln type, class. Preferably apply
21-
# some search optimization so people can actually find the module.
22-
# We encourage consistency between module name and file name.
2319
'Name' => 'LINQPad Deserialization Exploit',
2420
'Description' => %q{
2521
This module exploits a bug in LIQPad up to version 5.48.00. The bug is only exploitable in paid version of software. The core of a bug is cache file containing deserialized data, which attacker can overwrite with malicious payload. The data gets deserialized every time the app restarts.
@@ -32,14 +28,13 @@ def initialize(info = {})
3228
'Platform' => 'win',
3329
'SessionTypes' => [ 'shell', 'meterpreter' ],
3430
'Targets' => [[ 'Windows', { 'Arch' => ARCH_CMD } ]],
35-
# 'Privileged' => true,
31+
'Privileged' => true,
3632
'References' => [
3733
[ 'URL', 'https://trustedsec.com/blog/discovering-a-deserialization-vulnerability-in-linqpad'],
38-
[ 'CVE', '1978-1234']
34+
[ 'CVE', '2024-53326']
3935
],
4036
'DisclosureDate' => '2024-12-03',
4137
'DefaultTarget' => 0,
42-
# https://docs.metasploit.com/docs/development/developing-modules/module-metadata/definition-of-module-reliability-side-effects-and-stability.html
4338
'Notes' => {
4439
'Stability' => [CRASH_SAFE],
4540
'Reliability' => [REPEATABLE_SESSION],

0 commit comments

Comments
 (0)