Skip to content

Commit 5dd2fef

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 5fd6184 commit 5dd2fef

File tree

1 file changed

+46
-0
lines changed

1 file changed

+46
-0
lines changed

db/modules_metadata_base.json

Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -100823,6 +100823,52 @@
100823100823
"session_types": false,
100824100824
"needs_cleanup": null
100825100825
},
100826+
"exploit_multi/fileformat/xdg_desktop": {
100827+
"name": "Malicious XDG Desktop File",
100828+
"fullname": "exploit/multi/fileformat/xdg_desktop",
100829+
"aliases": [],
100830+
"rank": 500,
100831+
"disclosure_date": "2007-02-06",
100832+
"type": "exploit",
100833+
"author": [
100834+
"bcoles <[email protected]>"
100835+
],
100836+
"description": "This module creates a malicious XDG Desktop (.desktop) file.\n\n On most modern systems, desktop files are not trusted by default.\n The user will receive a warning prompt that the file is not trusted\n when running the file, but may choose to run the file anyway.\n\n The default file manager applications in some desktop environments\n may impose more strict execution requirements by prompting the user\n to set the file as executable and/or marking the file as trusted\n before the file can be executed.",
100837+
"references": [
100838+
"ATT&CK-T1204.002",
100839+
"URL-https://specifications.freedesktop.org/desktop-entry-spec/latest/",
100840+
"URL-https://specifications.freedesktop.org/desktop-entry-spec/latest/exec-variables.html",
100841+
"URL-https://wiki.archlinux.org/title/Desktop_entries"
100842+
],
100843+
"platform": "FreeBSD,Linux,Solaris,Unix",
100844+
"arch": "cmd",
100845+
"rport": null,
100846+
"autofilter_ports": [],
100847+
"autofilter_services": [],
100848+
"targets": [
100849+
"Automatic"
100850+
],
100851+
"mod_time": "2025-08-04 19:23:02 +0000",
100852+
"path": "/modules/exploits/multi/fileformat/xdg_desktop.rb",
100853+
"is_install_path": true,
100854+
"ref_name": "multi/fileformat/xdg_desktop",
100855+
"check": false,
100856+
"post_auth": false,
100857+
"default_credential": false,
100858+
"notes": {
100859+
"Stability": [
100860+
"crash-safe"
100861+
],
100862+
"Reliability": [
100863+
"repeatable-session"
100864+
],
100865+
"SideEffects": [
100866+
"screen-effects"
100867+
]
100868+
},
100869+
"session_types": false,
100870+
"needs_cleanup": null
100871+
},
100826100872
"exploit_multi/fileformat/zip_slip": {
100827100873
"name": "Generic Zip Slip Traversal Vulnerability",
100828100874
"fullname": "exploit/multi/fileformat/zip_slip",

0 commit comments

Comments
 (0)