Share
## https://sploitus.com/exploit?id=0C18A9E0-97FE-5D2C-BE54-CA9B0F552E04
# PoC_CVE-2023-24055

### How to run ?

Edit the $User var in the script and replace value with your Username.

Open a PowerShell as administrator and run the script :
```
./PoC_CVE-2023-24055.ps1
```

After the script execution open KeePass.

Result is stored under "C:\Users\your_username\AppData\Local\Temp\output.xml"

Password stored in cleartext under :
```
<String>
  <Key>Password</Key>
  <Value ProtectInMemory="True">ExempePassword</Value>
</String>
```

### Sources
- https://vulners.com/cve/CVE-2023-24055
- https://sourceforge.net/p/keepass/discussion/329220/thread/a146e5cf6b/
- https://keepass.info/help/kb/trigger_examples.html