Update info hash
This commit is contained in:
parent
e8456a6625
commit
2f9e5cd332
|
@ -18,7 +18,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
There exists a .NET deserialization vulnerability in Greenshot version 1.3.274
|
||||
and below. The deserialization allows the execution of commands when a user opens
|
||||
a Greenshot file. The commands execute under the same permissions as the Greenshot
|
||||
service. Typically this is as the logged in user.
|
||||
service. Typically, is the logged in user.
|
||||
},
|
||||
'DisclosureDate' => '2023-07-26',
|
||||
'Author' => [
|
||||
|
@ -31,20 +31,14 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
],
|
||||
'License' => MSF_LICENSE,
|
||||
'Platform' => 'win',
|
||||
'Arch' => ARCH_CMD,
|
||||
'Targets' => [
|
||||
[
|
||||
'Windows Command',
|
||||
{
|
||||
'Arch' => ARCH_CMD,
|
||||
'Type' => :windows_command,
|
||||
'Space' => 3000
|
||||
}
|
||||
]
|
||||
[ 'Windows', {} ],
|
||||
],
|
||||
'Notes' => {
|
||||
'Stability' => [CRASH_SAFE],
|
||||
'Reliability' => [REPEATABLE_SESSION],
|
||||
'SideEffects' => [ARTIFACTS_ON_DISK]
|
||||
'SideEffects' => [ARTIFACTS_ON_DISK, SCREEN_EFFECTS]
|
||||
}
|
||||
)
|
||||
)
|
||||
|
|
Loading…
Reference in New Issue