Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-46747
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
BIG-IP Configuration utility unauthenticated remote code execution vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用候选路径或通道进行的认证绕过
Source: NVD (National Vulnerability Database)
Vulnerability Title
F5 BIG-IP Configuration utility 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
F5 BIG-IP是美国F5公司的一款集成了网络流量管理、应用程序安全管理、负载均衡等功能的应用交付平台。 F5 BIG-IP Configuration utility存在安全漏洞,该漏洞源于存在远程代码执行(RCE)漏洞。攻击者可利用该漏洞通过management port或self IP addresses执行任意系统命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
F5BIG-IP 17.1.0 ~ * -
II. Public POCs for CVE-2023-46747
#POC DescriptionSource LinkShenlong Link
1CVE-2023-46747 (F5 BIG-IP) RCEhttps://github.com/bijaysenihang/CVE-2023-46747-Mass-RCEPOC Details
2exploit for f5-big-ip RCE cve-2023-46747https://github.com/W01fh4cker/CVE-2023-46747-RCEPOC Details
3CVE-2023-46747 Criticle Auth Bypasshttps://github.com/fu2x2000/CVE-2023-46747POC Details
4Nonehttps://github.com/maniak-academy/Mitigate-CVE-2023-46747POC Details
5Nonehttps://github.com/y4v4z/CVE-2023-46747-POCPOC Details
6Nonehttps://github.com/nvansluis/test_cve-2023-46747POC Details
7An Exploitation script developed to exploit the CVE-2023-46747 which Pre Auth Remote Code Execution of f5-BIG Ip producshttps://github.com/sanjai-AK47/CVE-2023-46747POC Details
8Nonehttps://github.com/vidura2/cve-2023-46747POC Details
9exploit for f5-big-ip RCE cve-2023-46747https://github.com/rainbowhatrkn/CVE-2023-46747-RCEPOC Details
10An Exploitation script developed to exploit the CVE-2023-46747 which Pre Auth Remote Code Execution of f5-BIG Ip producshttps://github.com/RevoltSecurities/CVE-2023-46747POC Details
11CVE-2023-46747-Mass-RCEhttps://github.com/Rizzler4562/CVE-2023-46747-Mass-RCEPOC Details
12CVE-2023-46747-Mass-RCEhttps://github.com/Xanexs/CVE-2023-46747-Mass-RCEPOC Details
13CVE-2023-46747-Mass-RCEhttps://github.com/AMELYA13/CVE-2023-46747-Mass-RCEPOC Details
14CVE-2023-46747-Mass-RCEhttps://github.com/MacTavish2/CVE-2023-46747-Mass-RCEPOC Details
15Nonehttps://github.com/zgimszhd61/CVE-2023-46747-RCE-pocPOC Details
16CVE-2023-46747 is a critical severity authentication bypass vulnerability in F5 BIG-IP that could allow an unauthenticated attacker to achieve remote code execution (RCE). The vulnerability impacts the BIG-IP Configuration utility, also known as the TMUI, wherein arbitrary requests can bypass authentication. The vulnerability received a CVSSv3 score of 9.8. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-46747.yamlPOC Details
17CVE-2023-46747-RCE PoC https://github.com/cediegreyhat/BigFingerPOC Details
18# F5 BIG-IP CVE-2023-46747 – Unauth RCE + Auto Reverse Shell Modified & improved Nuclei template by raguraman ✓ Creates hidden admin ✓ Instant TCP revshell (just edit LHOST/LPORT) ✓ Works on all unpatched 13.x-17.x ⚠️ Authorized pentesting ONLY! Patch: K000137353https://github.com/Razzlemouse/F5-BIG-IP-CVE-2023-46747---Unauthenticated-RCE-Reverse-Shell-Nuclei-Template-Modified-POC Details
19# F5 BIG-IP CVE-2023-46747 – Unauth RCE + Auto Reverse Shell Modified Nuclei template by raguraman ✓ Creates hidden admin ✓ Instant TCP revshell (just edit LHOST/LPORT) ✓ Works on all unpatched 13.x-17.x ⚠️ Authorized pentesting ONLY! Patch: K000137353https://github.com/Razzlemouse/F5-BIG-IP-SmuggleShell-CVE-2023-46747-ExploitPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-46747
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-46747

No comments yet


Leave a comment