## https://sploitus.com/exploit?id=FD2E726A-EAA4-5A32-A555-00AFC01C5932
# CVE-2023-28252-Compiled-exe
A modification of Fortra's excellent CVE-2023-2852 Privesc Exploit. Works on Windows 11 21H2 clfs.sys version 10.0.22000.1574 - also works on Windows 10 21H2, Windows 10 22H2, Windows 11 22H2 and Windows server 2022.
This version retains the original functionality, but gives the option to provide a binary to execute as an argument, useful if you don't have visual studio to hand.
## Description
For a (very) detailed explanation of the vulnerability, please see https://github.com/fortra/CVE-2023-28252/tree/master?tab=readme-ov-file
## Usage
- Build the project with visual studio if you prefer
- Use the pre compiled exploit.exe if you prefer
- Run with: `exploit.exe <Token Offset> <Flag> <Program to execute>`
- Example: `exploit.exe 1208 1 calc.exe`
## Example
[CVE-2023-28252.webm](https://github.com/duck-sec/CVE-2023-28252-Compiled-exe/assets/129839654/27f286d7-e0e3-47ab-864a-e040f8749708)
## Credits
This exploit builds on the oiringal POC by [Fortra](https://github.com/fortra/CVE-2023-28252/tree/master?tab=readme-ov-file). Please read their excellent documentation!
## Disclaimer
This code is provided for educational and ethical security testing purposes only. It should be used responsibly and only in environments where explicit authorization has been granted. Unauthorized or malicious use is strictly prohibited. By using this code, you agree to adhere to all applicable laws, regulations, and ethical standards applicable in your jurisdiction. The creators and contributors disclaim any liability for any damages or consequences arising from the misuse or unauthorized use of this code.