Progress Kemp LoadMaster Unauthenticated Command Injection Vulnerability
漏洞信息
漏洞名称: Progress Kemp LoadMaster Unauthenticated Command Injection Vulnerability
漏洞编号:
- CVE: CVE-2024-1212
漏洞类型: 命令执行
漏洞等级: 高危
漏洞描述: Progress Kemp LoadMaster是一款广泛使用的负载均衡解决方案,常见于企业级网络环境中,用于优化资源分配和提高应用性能。由于其广泛部署,该产品的安全性对许多组织的网络架构至关重要。CVE-2024-1212是一个未经验证的命令注入漏洞,存在于Progress Kemp LoadMaster中。攻击者可以通过向/access/set
端点发送特制的HTTP请求,无需任何认证即可在系统上执行任意命令。这种漏洞的根源在于输入验证不足,允许攻击者注入恶意命令。此漏洞的高危性在于它允许远程代码执行(RCE),可能导致数据泄露、服务中断或其他恶意活动。由于攻击无需认证,且可以自动化执行,因此对受影响系统的威胁极大。
产品厂商: Progress Kemp
产品名称: LoadMaster
来源: https://github.com/r0otk3r/CVE-2024-1212
类型: CVE-2024:github search
仓库文件
- README.md
- cve_2024_1212_exploit.py
来源概述
CVE-2024-1212 - Progress Kemp LoadMaster Unauthenticated Command Injection
This is an exploit script for CVE-2024-1212, an unauthenticated command injection vulnerability in Progress Kemp LoadMaster.
Vulnerability Summary
CVE-2024-1212 affects Progress Kemp LoadMaster, allowing unauthenticated attackers to execute arbitrary commands on the system via a crafted HTTP request to the /access/set
endpoint.
Features
- Unauthenticated Remote Command Execution (RCE)
- Randomized
User-Agent
headers to avoid basic detection - Proxy support for Burp/ZAP interception (
-p
) - Output logging to file (
-o
)
Usage
1 |
|
Options
Argument | Description |
---|---|
-u , --url |
Target base URL (e.g., http://192.168.1.1 ) [REQUIRED] |
-c , --command |
Command to execute (default: id ) |
-p , --proxy |
Proxy URL (e.g., http://127.0.0.1:8080 ) for intercepting traffic |
-o , --output |
Save the output to a file (e.g., result.txt ) |
Example
1 |
|
Request/Response
⚠️ DISCLAIMER
This script is provided for educational and authorized security testing purposes only.