Share
## https://sploitus.com/exploit?id=2647D0A3-14DD-5B2F-B1DF-235662F6AC6E
**Exploring Command Injection Vulnerabilities in Windows with Nim**

* https://foxoman.hashnode.dev/exploring-command-injection-vulnerabilities-in-windows-with-nim?showSharer=true

Here's a summarized table based on the testing results from the Nim code experiments with different payloads:

| Payload                | execProcess_NoQuoteShell | execProcess_QuoteShell | execShellCmd |
|------------------------|--------------------------|------------------------|--------------|
| `nim &calc`            | Not Passed               | Not Passed             | Passed       |
| `nim" &calc`           | Passed                   | Not Passed             | Not Passed   |
| `%CMDCMDLINE:~-1%&calc`| Passed                   | Passed                 | Passed       |

"Passed" indicates the payload executed in a way that could potentially exploit the BatBadBut vulnerability, demonstrating the nuanced behavior of command execution methods in Nim in response to different types of inputs.


----

- CVE-2024-24576 PoC on GitHub: [https://github.com/frostb1ten/CVE-2024-24576-PoC](https://github.com/frostb1ten/CVE-2024-24576-PoC)
- Flatt Security Research article: [https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows/](https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows/)