XAMPP - CVE-2020-11107# CVE-2020-11107
This is a writeup for CVE-2020-11107 I've found.
An issue was discovered in XAMPP before 7.2.29, 7.3.x before 7.3.16 , and 7.4.x before 7.4.4 on Windows.
An unprivileged user can change a .exe configuration in xampp-contol.ini for all users (including admins) to enable arbitrary command execution.
All this can be done through xampps control-panel.
XAMPP allows an unprivileged User to access and modify its editor and browser configuration. The default value is notepad.exe
The default value can be changed to set a bat file as the editor or browser. After saving the configuration, it changed for every user which can access the control panel.
If an attacker sets the notepad value to a malicious .exe file or .bat file it gets executed after another user tries to open the log files via the control panel. This can result in grating a normal user admin privileges or worse.
A step by step PoC can be found below:
1. Default values of XAMPP‘s config file.

2. Normal user which can access the control panel.

3. Changing the notepad.exe file as User Silky to a malicious file.

4. Config of Administrator got changed as well.

5. Administrator tries to view a log file.

6. Code gets executed and grants User Silky Admin rights.

# References:
1. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11107
2. https://www.apachefriends.org/blog/new_xampp_20200401.html
3. https://nvd.nist.gov/vuln/detail/CVE-2020-11107
[4.0K] /data/pocs/96df9b1451566fbd60c2792b8d75ae22644b4a7e
├── [ 41K] Contents of .bat file.PNG
├── [2.0K] README.md
├── [293K] Step1-Default Configuration.PNG
├── [389K] Step2-Normal User Silky.PNG
├── [429K] Step3.5-File got changed.PNG
├── [348K] Step3-Changing the editor.PNG
├── [338K] Step4-Administrator File changed.PNG
├── [283K] Step5-Admin tries to access log file.PNG
└── [ 63K] Step6- Silky got Admin Privs.PNG
0 directories, 9 files