VulnerAlert



APPLICATION
17-09-2025 21:01

CVE-2025-59050 Vulnerabilidad documentada

Sin puntuación
Tags
#data
#windows
#using
#source
#open
#form
#application
#arbitrary
#vulnerable
#issue
#fix
#execution
#execute
#allow
#attack
Descripción
Greenshot is an open source Windows screenshot utility. Greenshot 1.3.300 and earlier deserializes attacker-controlled data received in a WM_COPYDATA message using BinaryFormatter.Deserialize without prior validation or authentication, allowing local process at the same integrity level to trigger arbitrary code execution inside process. The vulnerable logic resides WinForms WndProc handler for (message 74) that copies supplied bytes into MemoryStream invokes BinaryFormatter.Deserialize, only afterward checks whether specified channel authorized. Because authorization check occurs after deserialization, any gadget chain embedded serialized payload executes regardless of membership. A attacker who can send main window achieve in-process execution, which may aid evasion application control policies by running payloads within trusted, signed Greenshot.exe This issue fixed version 1.3.301. No known workarounds exist.
https://github.com/greenshot/greenshot/commit/f5a29a2ed3b0eb49231c0f4618300f488cf1b04d
https://github.com/greenshot/greenshot/security/advisories/GHSA-8f7f-x7ww-xx5w
https://github.com/greenshot/greenshot/security/advisories/GHSA-8f7f-x7ww-xx5w
Referencia
Link externo
Ver detalles

Fuente
https://nvd.nist.gov/vuln/detail/CVE-2025-59050
Resultados similares
Coincidentes en almenos en 50% de los tags
17-09-2025 CVE-2025-9818
A vulnerability (CWE-428) has been identified in the Uninterruptible Power Supply (UPS) managem...
Ver información
17-09-2025 CVE-2024-13174
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerabil...
Ver información
Icons made by Freepik from www.flaticon.com
Este Proyecto fue cofinanciado por el Consejo Nacional de Ciencia y Tecnología (CONACYT) a través del PROINNOVA 2021/2023
Proyecto realizado por