Share
## https://sploitus.com/exploit?id=7242C2A9-E5B5-5E0F-91DD-9C0CA41345E3
# CVE-2024-49112-PoC
CVE-2024-49112 LDAP RCE PoC and Metasploit Module<br>
Edit: links updated (last 3 copies to go)<br>
[Link to Download: ](https://bit.ly/4az6XBf)

## Contact Information
You can reach me at: [bollo.b0@proton.me](mailto:bollo.b0@proton.me)
please dont ask me if I can provide this for free, or if I can test your target, or how to add the module to metasploit(google it please).
what I can offer?:
if you need any help with setting up the python version (I can guide).
if you need help with the analyze (I can answer you questions regarding the analyze via email).


# CVE-2024-49112: Integer Overflow Vulnerability in Windows LDAP Service Leading to Unauthenticated RCE

The **Windows Lightweight Directory Access Protocol (LDAP)** service is vulnerable to an **integer overflow**, which can lead to **unauthenticated remote code execution (RCE)**. This vulnerability allows attackers to execute arbitrary code on a vulnerable system. here, we focus on exploiting the LDAP **server-side** vulnerability (unauthenticate and no user interaction).

## Vulnerability Overview
- **CVE Identifier**: **CVE-2024-49112**
- **Vulnerability Type**: **Integer Overflow**
- **Impact**: **Unauthenticated Remote Code Execution**
- **User Interaction**: **None required**

This vulnerability exists in both the **LDAP server** and the **LDAP client**. However, exploiting these components requires different approaches. here, we will focus on exploitation of the **LDAP server**, which can be targeted directly to achieve RCE without any user interaction.


## Exploit
I will include all my findings and technical details regarding the above mentioned component <br>
with the python script showed below in the video PoC and the custom metasploit module which <br>
I wrote for this to make it easier for post exploitations. <br>
# [Link to Download: ](https://bit.ly/4az6XBf)

## PoC Video
You can view PoC video here:  
![Watch the PoC](ldap.gif).