Update info hash

This commit is contained in:
bwatters 2023-08-04 11:16:38 -05:00
parent e8456a6625
commit 2f9e5cd332
No known key found for this signature in database
GPG Key ID: ECC0F0A52E65F268
1 changed files with 4 additions and 10 deletions

View File

@ -18,7 +18,7 @@ class MetasploitModule < Msf::Exploit::Remote
There exists a .NET deserialization vulnerability in Greenshot version 1.3.274
and below. The deserialization allows the execution of commands when a user opens
a Greenshot file. The commands execute under the same permissions as the Greenshot
service. Typically this is as the logged in user.
service. Typically, is the logged in user.
},
'DisclosureDate' => '2023-07-26',
'Author' => [
@ -31,20 +31,14 @@ class MetasploitModule < Msf::Exploit::Remote
],
'License' => MSF_LICENSE,
'Platform' => 'win',
'Arch' => ARCH_CMD,
'Targets' => [
[
'Windows Command',
{
'Arch' => ARCH_CMD,
'Type' => :windows_command,
'Space' => 3000
}
]
[ 'Windows', {} ],
],
'Notes' => {
'Stability' => [CRASH_SAFE],
'Reliability' => [REPEATABLE_SESSION],
'SideEffects' => [ARTIFACTS_ON_DISK]
'SideEffects' => [ARTIFACTS_ON_DISK, SCREEN_EFFECTS]
}
)
)