# 未经授权的远程代码执行漏洞存在于BIG-IP配置工具中
## 漏洞概述
未披露的请求可能绕过配置实用程序的身份验证,允许通过管理端口和/或自 IP 地址访问 BIG-IP 系统的攻击者执行任意系统命令。
## 影响版本
尚未披露受影响的具体版本。已达到技术支持结束(EoTS)的软件版本未进行评估。
## 漏洞细节
攻击者可以通过未披露的请求手段绕过配置实用程序的身份验证机制。一旦通过管理端口或自 IP 地址访问 BIG-IP 系统,攻击者就能够执行任意系统命令。
## 影响
攻击者能够执行任意系统命令,可能导致系统被完全控制或数据泄露等严重后果。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | CVE-2023-46747 (F5 BIG-IP) RCE | https://github.com/bijaysenihang/CVE-2023-46747-Mass-RCE | POC详情 |
2 | exploit for f5-big-ip RCE cve-2023-46747 | https://github.com/W01fh4cker/CVE-2023-46747-RCE | POC详情 |
3 | CVE-2023-46747 Criticle Auth Bypass | https://github.com/fu2x2000/CVE-2023-46747 | POC详情 |
4 | None | https://github.com/maniak-academy/Mitigate-CVE-2023-46747 | POC详情 |
5 | None | https://github.com/y4v4z/CVE-2023-46747-POC | POC详情 |
6 | None | https://github.com/nvansluis/test_cve-2023-46747 | POC详情 |
7 | An Exploitation script developed to exploit the CVE-2023-46747 which Pre Auth Remote Code Execution of f5-BIG Ip producs | https://github.com/sanjai-AK47/CVE-2023-46747 | POC详情 |
8 | None | https://github.com/vidura2/cve-2023-46747 | POC详情 |
9 | exploit for f5-big-ip RCE cve-2023-46747 | https://github.com/rainbowhatrkn/CVE-2023-46747-RCE | POC详情 |
10 | An Exploitation script developed to exploit the CVE-2023-46747 which Pre Auth Remote Code Execution of f5-BIG Ip producs | https://github.com/RevoltSecurities/CVE-2023-46747 | POC详情 |
11 | CVE-2023-46747-Mass-RCE | https://github.com/Rizzler4562/CVE-2023-46747-Mass-RCE | POC详情 |
12 | CVE-2023-46747-Mass-RCE | https://github.com/Xanexs/CVE-2023-46747-Mass-RCE | POC详情 |
13 | CVE-2023-46747-Mass-RCE | https://github.com/AMELYA13/CVE-2023-46747-Mass-RCE | POC详情 |
14 | CVE-2023-46747-Mass-RCE | https://github.com/MacTavish2/CVE-2023-46747-Mass-RCE | POC详情 |
15 | None | https://github.com/zgimszhd61/CVE-2023-46747-RCE-poc | POC详情 |
16 | CVE-2023-46747 is a critical severity authentication bypass vulnerability in F5 BIG-IP that could allow an unauthenticated attacker to achieve remote code execution (RCE). The vulnerability impacts the BIG-IP Configuration utility, also known as the TMUI, wherein arbitrary requests can bypass authentication. The vulnerability received a CVSSv3 score of 9.8. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-46747.yaml | POC详情 |