Files
beef/modules/exploits/kemp_command_execution/config.yaml
2024-12-25 12:43:13 +10:00

16 lines
805 B
YAML

#
# Copyright (c) 2006-2025 Wade Alcorn - wade@bindshell.net
# Browser Exploitation Framework (BeEF) - https://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
kemp_command_execution:
enable: true
category: "Exploits"
name: "Kemp LoadBalancer Command Execution"
description: "This module exploits a remote code execution vulnerability in Kemp LoadBalancer 7.1-16.<br/>More information can be found here: <a href='http://blog.malerisch.net/2015/04/playing-with-kemp-load-master.html'>http://blog.malerisch.net/2015/04/playing-with-kemp-load-master.html</a><br/>"
authors: ["Roberto Suggi Liverani", "@malerisch", "CVE-2014-5287","CVE-2014-5288"]
target:
working: ["ALL"]