module
Progress Flowmon Local sudo privilege escalation
Disclosed | Created |
---|---|
03/19/2024 | 05/29/2024 |
Disclosed
03/19/2024
Created
05/29/2024
Description
This module abuses a feature of the sudo command on Progress Flowmon.
Certain binary files are allowed to automatically elevate
with the sudo command. This is based off of the file name. This
includes executing a PHP command with a specific file name. If the
file is overwritten with PHP code it can be used to elevate privileges
to root. Progress Flowmon up to at least version 12.3.5 is vulnerable.
Certain binary files are allowed to automatically elevate
with the sudo command. This is based off of the file name. This
includes executing a PHP command with a specific file name. If the
file is overwritten with PHP code it can be used to elevate privileges
to root. Progress Flowmon up to at least version 12.3.5 is vulnerable.
Author
Dave Yesland with Rhino Security Labs
Platform
Linux,Unix
Architectures
x86, x64
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:
msf > use exploit/linux/local/progress_flowmon_sudo_privesc_2024 msf /(4) > show actions ...actions... msf /(4) > set ACTION < action-name > msf /(4) > show options ...show and set options... msf /(4) > run

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.