**I am not responsible if you use the code improperly or illegally. The purpose of the script is purely educational and nothing more.**
# PHP-CVE-2023-2023-2640-POC-Escalation
<br />
<br />
in this script in **PHP** I tried to create exploit of
--cve-2023-2640--privilege-escalation CVE-2023-32629 & CVE-2023-2640
<br />
<br />
| ^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^ |
| ------------------------ | ------------- |
| ^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^ |
| ^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^ |
<br />
<br />
> **USE >>>>>>**
Do not use wget to download the PHP file because the code is downloaded in a messy way.
It's better to couple the script and create a .php file, then paste the code into it.
php poc.php
<br />
<br />
> **NOTE**
**the original CVE poc in bash is from**
https://github.com/ThrynSec/CVE-2023-32629-CVE-2023-2640---POC-Escalation?tab=readme-ov-file#cve-2023-32629
[orignal cve rep]([https://pages.github.com/](https://github.com/ThrynSec/CVE-2023-32629-CVE-2023-2640---POC-Escalation)https://github.com/ThrynSec/CVE-2023-32629-CVE-2023-2640---POC-Escalation).
<br />
<br />
**IMPORTANT**
I am not responsible if you use the code improperly or illegally. The purpose of the script is purely educational and nothing more.
[4.0K] /data/pocs/924882c6c48aadce7f7c3428f5f2a575869f3ed4
├── [ 580] poc.php
└── [1.3K] README.md
0 directories, 2 files