脆弱性情報
高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
脆弱性タイトル
Greenshot — Insecure .NET deserialization via WM_COPYDATA enables local code execution
脆弱性説明
Greenshot is an open source Windows screenshot utility. Greenshot 1.3.300 and earlier deserializes attacker-controlled data received in a WM_COPYDATA message using BinaryFormatter.Deserialize without prior validation or authentication, allowing a local process at the same integrity level to trigger arbitrary code execution inside the Greenshot process. The vulnerable logic resides in a WinForms WndProc handler for WM_COPYDATA (message 74) that copies the supplied bytes into a MemoryStream and invokes BinaryFormatter.Deserialize, and only afterward checks whether the specified channel is authorized. Because the authorization check occurs after deserialization, any gadget chain embedded in the serialized payload executes regardless of channel membership. A local attacker who can send WM_COPYDATA to the Greenshot main window can achieve in-process code execution, which may aid evasion of application control policies by running payloads within the trusted, signed Greenshot.exe process. This issue is fixed in version 1.3.301. No known workarounds exist.
CVSS情報
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
脆弱性タイプ
可信数据的反序列化
脆弱性タイトル
GreenShot 安全漏洞
脆弱性説明
GreenShot是GreenShot公司的一款适用于 Windows 的轻量级屏幕截图软件工具。 GreenShot 1.3.300及之前版本存在安全漏洞,该漏洞源于反序列化WM_COPYDATA消息中的攻击者控制数据时未经验证或身份验证,可能导致本地进程在相同完整性级别下触发任意代码执行。
CVSS情報
N/A
脆弱性タイプ
N/A