module
LINQPad Deserialization Exploit
| Disclosed | Created |
|---|---|
| Dec 3, 2024 | May 13, 2025 |
Disclosed
Dec 3, 2024
Created
May 13, 2025
Description
This module exploits a bug in LINQPad up to version 5.52.00. The bug is only exploitable in paid version of software. The core of a bug is cache file containing deserialized data, which attacker can overwrite with malicious payload. The data gets deserialized every time the app restarts.
Authors
msutovsky-r7 [email protected]
James Williams
James Williams
Platform
Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.