## https://sploitus.com/exploit?id=0C18A9E0-97FE-5D2C-BE54-CA9B0F552E04
# PoC_CVE-2023-24055
### How to run ?
Edit the $User var in the script and replace value with your Username.
Open a PowerShell as administrator and run the script :
```
./PoC_CVE-2023-24055.ps1
```
After the script execution open KeePass.
Result is stored under "C:\Users\your_username\AppData\Local\Temp\output.xml"
Password stored in cleartext under :
```
<String>
<Key>Password</Key>
<Value ProtectInMemory="True">ExempePassword</Value>
</String>
```
### Sources
- https://vulners.com/cve/CVE-2023-24055
- https://sourceforge.net/p/keepass/discussion/329220/thread/a146e5cf6b/
- https://keepass.info/help/kb/trigger_examples.html