module

Kemp LoadMaster Local sudo privilege escalation

Disclosed
2024-03-19
Created
2024-05-10

Description

This module abuses a feature of the sudo command on Progress Kemp
LoadMaster. Certain binary files are allowed to automatically elevate
with the sudo command. This is based off of the file name. Some files
have this permission are not write-protected from the default 'bal' user.
As such, if the file is overwritten with an arbitrary file, it will still
auto-elevate. This module overwrites the /bin/loadkeys file with another
executable.

Authors

Dave Yesland with Rhino Security Labs
bwatters-r7

Platform

Linux,Unix

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/linux/local/progress_kemp_loadmaster_sudo_privesc_2024
msf exploit(progress_kemp_loadmaster_sudo_privesc_2024) > show targets
...targets...
msf exploit(progress_kemp_loadmaster_sudo_privesc_2024) > set TARGET < target-id >
msf exploit(progress_kemp_loadmaster_sudo_privesc_2024) > show options
...show and set options...
msf exploit(progress_kemp_loadmaster_sudo_privesc_2024) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.