module
Greenshot .NET Deserialization Fileformat Exploit
Disclosed | Created |
---|---|
Jul 26, 2023 | Aug 17, 2023 |
Disclosed
Jul 26, 2023
Created
Aug 17, 2023
Description
There exists a .NET deserialization vulnerability in Greenshot version 1.3.274
and below. The deserialization allows the execution of commands when a user opens
a Greenshot file. The commands execute under the same permissions as the Greenshot
service. Typically, is the logged in user.
and below. The deserialization allows the execution of commands when a user opens
a Greenshot file. The commands execute under the same permissions as the Greenshot
service. Typically, is the logged in user.
Authors
p4r4bellum
bwatters-r7
bwatters-r7
Platform
Windows
Architectures
cmd
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.