Skip to content

Commit d626e56

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 66d657f commit d626e56

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

db/modules_metadata_base.json

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91383,7 +91383,8 @@
9138391383
"description": "This module abuses a feature of the sudo command on Progress Kemp\n LoadMaster. Certain binary files are allowed to automatically elevate\n with the sudo command. This is based off of the file name. Some files\n have this permission are not write-protected from the default 'bal' user.\n As such, if the file is overwritten with an arbitrary file, it will still\n auto-elevate. This module overwrites the /bin/loadkeys file with another\n executable.",
9138491384
"references": [
9138591385
"URL-https://rhinosecuritylabs.com/research/cve-2024-1212unauthenticated-command-injection-in-progress-kemp-loadmaster/",
91386-
"URL-https://kemptechnologies.com/kemp-load-balancers"
91386+
"URL-https://kemptechnologies.com/kemp-load-balancers",
91387+
"CVE-2024-1212"
9138791388
],
9138891389
"platform": "Linux,Unix",
9138991390
"arch": "",
@@ -91398,7 +91399,7 @@
9139891399
"Dropper",
9139991400
"Command"
9140091401
],
91401-
"mod_time": "2024-05-10 08:54:23 +0000",
91402+
"mod_time": "2025-01-16 16:32:00 +0000",
9140291403
"path": "/modules/exploits/linux/local/progress_kemp_loadmaster_sudo_privesc_2024.rb",
9140391404
"is_install_path": true,
9140491405
"ref_name": "linux/local/progress_kemp_loadmaster_sudo_privesc_2024",

0 commit comments

Comments
 (0)