# PoC_CVE-2023-24055
### How to run ?
Edit the $User var in the script and replace value with your Username.
Open a PowerShell as administrator and run the script :
```
./PoC_CVE-2023-24055.ps1
```
After the script execution open KeePass.
Result is stored under "C:\Users\your_username\AppData\Local\Temp\output.xml"
Password stored in cleartext under :
```
<String>
<Key>Password</Key>
<Value ProtectInMemory="True">ExempePassword</Value>
</String>
```
### Sources
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24055
- https://sourceforge.net/p/keepass/discussion/329220/thread/a146e5cf6b/
- https://keepass.info/help/kb/trigger_examples.html
[4.0K] /data/pocs/162a4c2aaff60aac24e05f02d94e7d0091c4fac2
├── [1.6K] PoC_CVE-2023-24055.ps1
└── [ 667] README.md
0 directories, 2 files