automatic module_metadata_base.json update

This commit is contained in:
Metasploit 2024-04-18 19:45:19 -05:00
parent bcaa5359da
commit e9d4f3e99c
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 55 additions and 0 deletions

View File

@ -95301,6 +95301,61 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/fileformat/gitlens_local_config_exec": {
"name": "GitLens Git Local Configuration Exec",
"fullname": "exploit/multi/fileformat/gitlens_local_config_exec",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-11-14",
"type": "exploit",
"author": [
"h00die",
"Paul Gerste"
],
"description": "GitKraken GitLens before v.14.0.0 allows an untrusted workspace to execute git\n commands. A repo may include its own .git folder including a malicious config file to\n execute arbitrary code.\n\n Tested against VSCode 1.87.2 with GitLens 13.6.0 on Ubuntu 22.04 and Windows 10",
"references": [
"URL-https://www.sonarsource.com/blog/vscode-security-markdown-vulnerabilities-in-extensions/",
"URL-https://www.sonarsource.com/blog/securing-developer-tools-git-integrations/",
"URL-https://github.com/gitkraken/vscode-gitlens/commit/ee2a0c42a92d33059a39fd15fbbd5dd3d5ab6440",
"CVE-2023-46944"
],
"platform": "",
"arch": "cmd",
"rport": null,
"autofilter_ports": [
],
"autofilter_services": [
],
"targets": [
"Linux/Unix (In-Memory)",
"PowerShell (In-Memory)"
],
"mod_time": "2024-04-18 17:31:02 +0000",
"path": "/modules/exploits/multi/fileformat/gitlens_local_config_exec.rb",
"is_install_path": true,
"ref_name": "multi/fileformat/gitlens_local_config_exec",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"screen-effects",
"artifacts-on-disk"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/fileformat/js_unpacker_eval_injection": {
"name": "Javascript Injection for Eval-based Unpackers",
"fullname": "exploit/multi/fileformat/js_unpacker_eval_injection",