module

Greenshot .NET Deserialization Fileformat Exploit

Disclosed
2023-07-26
Created
2023-08-17

Description

There exists a .NET deserialization vulnerability in Greenshot version 1.3.274
and below. The deserialization allows the execution of commands when a user opens
a Greenshot file. The commands execute under the same permissions as the Greenshot
service. Typically, is the logged in user.

Authors

p4r4bellum
bwatters-r7

Platform

Windows

Architectures

cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/fileformat/greenshot_deserialize_cve_2023_34634
msf exploit(greenshot_deserialize_cve_2023_34634) > show targets
...targets...
msf exploit(greenshot_deserialize_cve_2023_34634) > set TARGET < target-id >
msf exploit(greenshot_deserialize_cve_2023_34634) > show options
...show and set options...
msf exploit(greenshot_deserialize_cve_2023_34634) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.