An attacker can exploit this vulnerability by creating a malicious configuration file with elevated privileges. When a user with limited privileges attempts to start a service using NSSM, the service manager will execute the malicious configuration file, allowing the attacker to gain elevated privileges.
import os import sys
# Malicious configuration file path malicious_config_file = os.path.join(config_dir, ' malicious_config.txt') nssm-2.24 privilege escalation