Skip to content

Commit efe7aec

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 5faa0a5 commit efe7aec

File tree

1 file changed

+49
-0
lines changed

1 file changed

+49
-0
lines changed

db/modules_metadata_base.json

Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -163162,6 +163162,55 @@
163162163162
"needs_cleanup": true,
163163163163
"actions": []
163164163164
},
163165+
"exploit_windows/local/linqpad_deserialization_persistence": {
163166+
"name": "LINQPad Deserialization Exploit",
163167+
"fullname": "exploit/windows/local/linqpad_deserialization_persistence",
163168+
"aliases": [],
163169+
"rank": 300,
163170+
"disclosure_date": "2024-12-03",
163171+
"type": "exploit",
163172+
"author": [
163173+
"msutovsky-r7 <[email protected]>",
163174+
"James Williams"
163175+
],
163176+
"description": "This module exploits a bug in LIQPad up to version 5.48.00. The bug is only exploitable in paid version of software. The core of a bug is cache file containing deserialized data, which attacker can overwrite with malicious payload. The data gets deserialized every time the app restarts.",
163177+
"references": [
163178+
"URL-https://trustedsec.com/blog/discovering-a-deserialization-vulnerability-in-linqpad",
163179+
"CVE-2024-53326"
163180+
],
163181+
"platform": "Windows",
163182+
"arch": "",
163183+
"rport": null,
163184+
"autofilter_ports": [],
163185+
"autofilter_services": [],
163186+
"targets": [
163187+
"Windows"
163188+
],
163189+
"mod_time": "2025-05-06 08:43:57 +0000",
163190+
"path": "/modules/exploits/windows/local/linqpad_deserialization_persistence.rb",
163191+
"is_install_path": true,
163192+
"ref_name": "windows/local/linqpad_deserialization_persistence",
163193+
"check": true,
163194+
"post_auth": false,
163195+
"default_credential": false,
163196+
"notes": {
163197+
"Stability": [
163198+
"crash-safe"
163199+
],
163200+
"Reliability": [
163201+
"repeatable-session"
163202+
],
163203+
"SideEffects": [
163204+
"artifacts-on-disk"
163205+
]
163206+
},
163207+
"session_types": [
163208+
"shell",
163209+
"meterpreter"
163210+
],
163211+
"needs_cleanup": null,
163212+
"actions": []
163213+
},
163165163214
"exploit_windows/local/microfocus_operations_privesc": {
163166163215
"name": "Micro Focus Operations Bridge Manager / Reporter Local Privilege Escalation",
163167163216
"fullname": "exploit/windows/local/microfocus_operations_privesc",

0 commit comments

Comments
 (0)