Share
## https://sploitus.com/exploit?id=861AE816-0BED-579C-AB38-54617BC4A611
**I am not responsible if you use the code improperly or illegally. The purpose of the script is purely educational and nothing more.**


# PHP-CVE-2023-2023-2640-POC-Escalation
<br />
<br />

in this script in **PHP** I tried to create exploit of 

--cve-2023-2640--privilege-escalation CVE-2023-32629 & CVE-2023-2640


<br />
<br />

| ^^^^^^^^^^^^^^^^^^^^^^^  | ^^^^^^^^^^^^^^^^^^^^^^^ |
  | ------------------------ | ------------- |
  | ^^^^^^^^^^^^^^^^^^^^^^^  | ^^^^^^^^^^^^^^^^^^^^^^^  |
  | ^^^^^^^^^^^^^^^^^^^^^^^  | ^^^^^^^^^^^^^^^^^^^^^^^  |
<br />
<br />

>  **USE >>>>>>**


Do not use wget to download the PHP file because the code is downloaded in a messy way. 
It's better to couple the script and create a .php file, then paste the code into it.

 php poc.php


<br />
<br />

> **NOTE**

**the original CVE poc in bash is from**

https://github.com/ThrynSec/CVE-2023-32629-CVE-2023-2640---POC-Escalation?tab=readme-ov-file#cve-2023-32629 

[orignal cve rep]([https://pages.github.com/](https://github.com/ThrynSec/CVE-2023-32629-CVE-2023-2640---POC-Escalation)https://github.com/ThrynSec/CVE-2023-32629-CVE-2023-2640---POC-Escalation).


<br />
<br />

**IMPORTANT**
I am not responsible if you use the code improperly or illegally. The purpose of the script is purely educational and nothing more.