module

Progress Flowmon Local sudo privilege escalation

Disclosed
03/19/2024
Created
05/29/2024

Description

This module abuses a feature of the sudo command on Progress Flowmon.
Certain binary files are allowed to automatically elevate
with the sudo command. This is based off of the file name. This
includes executing a PHP command with a specific file name. If the
file is overwritten with PHP code it can be used to elevate privileges
to root. Progress Flowmon up to at least version 12.3.5 is vulnerable.

Author

Dave Yesland with Rhino Security Labs

Platform

Linux,Unix

Architectures

x86, x64

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


    msf > use exploit/linux/local/progress_flowmon_sudo_privesc_2024
    msf /(4) > show actions
        ...actions...
    msf /(4) > set ACTION < action-name >
    msf /(4) > show options
        ...show and set options...
    msf /(4) > run
  
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.