module
LINQPad Deserialization Exploit
Disclosed | Created |
---|---|
Dec 3, 2024 | May 13, 2025 |
Disclosed
Dec 3, 2024
Created
May 13, 2025
Description
This module exploits a bug in LIQPad up to version 5.48.00. The bug is only exploitable in paid version of software. The core of a bug is cache file containing deserialized data, which attacker can overwrite with malicious payload. The data gets deserialized every time the app restarts.
Authors
msutovsky-r7 martin_sutovsky@rapid7.com
James Williams
James Williams
Platform
Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.