module

Kemp LoadMaster Local sudo privilege escalation

Disclosed
03/19/2024
Created
05/10/2024

Description

This module abuses a feature of the sudo command on Progress Kemp
LoadMaster. Certain binary files are allowed to automatically elevate
with the sudo command. This is based off of the file name. Some files
have this permission are not write-protected from the default 'bal' user.
As such, if the file is overwritten with an arbitrary file, it will still
auto-elevate. This module overwrites the /bin/loadkeys file with another
executable.

Authors

Dave Yesland with Rhino Security Labsbwatters-r7

Platform

Linux,Unix

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


    msf > use exploit/linux/local/progress_kemp_loadmaster_sudo_privesc_2024
    msf /(4) > show actions
        ...actions...
    msf /(4) > set ACTION < action-name >
    msf /(4) > show options
        ...show and set options...
    msf /(4) > run
  
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.