Skip to content

duck-sec/CVE-2023-28252-Compiled-exe

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2023-28252-Compiled-exe

A modification of Fortra's excellent CVE-2023-2852 Privesc Exploit. Works on Windows 11 21H2 clfs.sys version 10.0.22000.1574 - also works on Windows 10 21H2, Windows 10 22H2, Windows 11 22H2 and Windows server 2022. This version retains the original functionality, but gives the option to provide a binary to execute as an argument, useful if you don't have visual studio to hand.

Description

For a (very) detailed explanation of the vulnerability, please see https://github.com/fortra/CVE-2023-28252/tree/master?tab=readme-ov-file

Usage

  • Build the project with visual studio if you prefer
  • Use the pre compiled exploit.exe if you prefer
  • Run with: exploit.exe <Token Offset> <Flag> <Program to execute>
  • Example: exploit.exe 1208 1 calc.exe

Example

CVE-2023-28252.webm

Credits

This exploit builds on the oiringal POC by Fortra. Please read their excellent documentation!

Disclaimer

This code is provided for educational and ethical security testing purposes only. It should be used responsibly and only in environments where explicit authorization has been granted. Unauthorized or malicious use is strictly prohibited. By using this code, you agree to adhere to all applicable laws, regulations, and ethical standards applicable in your jurisdiction. The creators and contributors disclaim any liability for any damages or consequences arising from the misuse or unauthorized use of this code.

About

A modification to fortra's CVE-2023-28252 exploit, compiled to exe

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published