Path: blob/master/documentation/modules/exploit/windows/persistence/linqpad_deserialization.md
27917 views
Vulnerable Application
LINQPad is a scratchpad for .NET programming. Versions prior to 5.52 contain a deserialization vulnerability in processing cache file when program is starting. Application can be downloaded from here.
Verification Steps
Install the application
Start msfconsole
Get session
Run:
use windows/local/linqpad_deserializationSet payload - for example
set payload cmd/windows/generic- and corresponding parametersSet parameters
session,cache_path,linqpad_path,cleanupRun exploit
Options
cache_path
The parameter sets path for folder, where vulnerable cache file is present. This is crucial part of the exploit as the folder can be used to identify whether the current version is vulnerable and the payload delivery is performed through cache file.