目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2023-46747 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
BIG-IP Configuration utility unauthenticated remote code execution vulnerability
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
使用候选路径或通道进行的认证绕过
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
F5 BIG-IP Configuration utility 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
F5 BIG-IP是美国F5公司的一款集成了网络流量管理、应用程序安全管理、负载均衡等功能的应用交付平台。 F5 BIG-IP Configuration utility存在安全漏洞,该漏洞源于存在远程代码执行(RCE)漏洞。攻击者可利用该漏洞通过management port或self IP addresses执行任意系统命令。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
F5BIG-IP 17.1.0 ~ * -
二、漏洞 CVE-2023-46747 的公开POC
#POC 描述源链接神龙链接
1CVE-2023-46747 (F5 BIG-IP) RCEhttps://github.com/bijaysenihang/CVE-2023-46747-Mass-RCEPOC详情
2exploit for f5-big-ip RCE cve-2023-46747https://github.com/W01fh4cker/CVE-2023-46747-RCEPOC详情
3CVE-2023-46747 Criticle Auth Bypasshttps://github.com/fu2x2000/CVE-2023-46747POC详情
4Nonehttps://github.com/maniak-academy/Mitigate-CVE-2023-46747POC详情
5Nonehttps://github.com/y4v4z/CVE-2023-46747-POCPOC详情
6Nonehttps://github.com/nvansluis/test_cve-2023-46747POC详情
7An Exploitation script developed to exploit the CVE-2023-46747 which Pre Auth Remote Code Execution of f5-BIG Ip producshttps://github.com/sanjai-AK47/CVE-2023-46747POC详情
8Nonehttps://github.com/vidura2/cve-2023-46747POC详情
9exploit for f5-big-ip RCE cve-2023-46747https://github.com/rainbowhatrkn/CVE-2023-46747-RCEPOC详情
10An Exploitation script developed to exploit the CVE-2023-46747 which Pre Auth Remote Code Execution of f5-BIG Ip producshttps://github.com/RevoltSecurities/CVE-2023-46747POC详情
11CVE-2023-46747-Mass-RCEhttps://github.com/Rizzler4562/CVE-2023-46747-Mass-RCEPOC详情
12CVE-2023-46747-Mass-RCEhttps://github.com/Xanexs/CVE-2023-46747-Mass-RCEPOC详情
13CVE-2023-46747-Mass-RCEhttps://github.com/AMELYA13/CVE-2023-46747-Mass-RCEPOC详情
14CVE-2023-46747-Mass-RCEhttps://github.com/MacTavish2/CVE-2023-46747-Mass-RCEPOC详情
15Nonehttps://github.com/zgimszhd61/CVE-2023-46747-RCE-pocPOC详情
16CVE-2023-46747 is a critical severity authentication bypass vulnerability in F5 BIG-IP that could allow an unauthenticated attacker to achieve remote code execution (RCE). The vulnerability impacts the BIG-IP Configuration utility, also known as the TMUI, wherein arbitrary requests can bypass authentication. The vulnerability received a CVSSv3 score of 9.8. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-46747.yamlPOC详情
17CVE-2023-46747-RCE PoC https://github.com/cediegreyhat/BigFingerPOC详情
18# F5 BIG-IP CVE-2023-46747 – Unauth RCE + Auto Reverse Shell Modified & improved Nuclei template by raguraman ✓ Creates hidden admin ✓ Instant TCP revshell (just edit LHOST/LPORT) ✓ Works on all unpatched 13.x-17.x ⚠️ Authorized pentesting ONLY! Patch: K000137353https://github.com/Razzlemouse/F5-BIG-IP-CVE-2023-46747---Unauthenticated-RCE-Reverse-Shell-Nuclei-Template-Modified-POC详情
19# F5 BIG-IP CVE-2023-46747 – Unauth RCE + Auto Reverse Shell Modified Nuclei template by raguraman ✓ Creates hidden admin ✓ Instant TCP revshell (just edit LHOST/LPORT) ✓ Works on all unpatched 13.x-17.x ⚠️ Authorized pentesting ONLY! Patch: K000137353https://github.com/Razzlemouse/F5-BIG-IP-SmuggleShell-CVE-2023-46747-ExploitPOC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2023-46747 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-46747

暂无评论


发表评论