module
Progress Flowmon Local sudo privilege escalation
| Disclosed |
|---|
| Mar 19, 2024 |
Disclosed
Mar 19, 2024
Description
This module abuses a feature of the sudo command on Progress Flowmon.
Certain binary files are allowed to automatically elevate
with the sudo command. This is based off of the file name. This
includes executing a PHP command with a specific file name. If the
file is overwritten with PHP code it can be used to elevate privileges
to root. Progress Flowmon up to at least version 12.3.5 is vulnerable.
Certain binary files are allowed to automatically elevate
with the sudo command. This is based off of the file name. This
includes executing a PHP command with a specific file name. If the
file is overwritten with PHP code it can be used to elevate privileges
to root. Progress Flowmon up to at least version 12.3.5 is vulnerable.
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.