POC详情: 154be6ca0153b301cacdb338cc11fc0e105b0b90

来源
关联漏洞
标题: F5 BIG-IP 访问控制错误漏洞 (CVE-2022-1388)
描述:F5 BIG-IP是美国F5公司的一款集成了网络流量管理、应用程序安全管理、负载均衡等功能的应用交付平台。 F5 BIG-IP 存在访问控制错误漏洞,攻击者可以通过未公开的请求利用该漏洞绕过BIG-IP中的iControl REST身份验证来控制受影响的系统。
介绍
# CVE-2022-1388 - F5 BIG-IP iControl REST Authentication Bypass RCE

This Python script exploits CVE-2022-1388, a critical vulnerability in F5 BIG-IP iControl REST that allows **unauthenticated remote command execution** via improper access control and HTTP header handling.

> ⚠️ **For educational and authorized security research only. Do not use against systems you do not own or have explicit permission to test.**

## Vulnerability Summary

- **CVE ID:** [CVE-2022-1388](https://nvd.nist.gov/vuln/detail/CVE-2022-1388)
- **Vendor:** F5 Networks
- **Affected Product:** BIG-IP (various versions)
- **Impact:** Remote attackers can bypass authentication and execute arbitrary system commands via crafted HTTP requests.

---

##  Features

- Remote command execution via REST API
- Optional interactive shell (`--shell`)
- Custom HTTP basic authentication support
- SSL verification disabled (for self-signed certs)

---

##  Usage

```bash
python3 cve_2022_1388_exploit.py -u <target_url> -c "<command>"
```
## Examples
#### Run a Single Command
```bash
python3 cve_2022_1388_exploit.py -u https://192.168.1.1 -c "id"
```
<img width="1351" height="148" alt="id" src="https://github.com/user-attachments/assets/6a6fe86f-c5d5-42a4-b7c1-8d7030dc14a9" />

---
#### Run with Custom Credentials
```bash 
python3 cve_2022_1388_exploit.py -u https://192.168.1.1 -a "root:password" -c "whoami"
```
<img width="1352" height="146" alt="whoa" src="https://github.com/user-attachments/assets/b5b7f9d6-43d8-48fc-bd07-39e3bc6d378b" />


----

### Start Interactive Shell
```bash
python3 cve_2022_1388_exploit.py -u https://192.168.1.1 --shell
```
<img width="1352" height="417" alt="shell" src="https://github.com/user-attachments/assets/319618d9-7d5c-47fe-b30b-21bf0483a80e" />

---

### How It Works

-    The script bypasses auth by setting a forged X-F5-Auth-Token and Authorization headers.

-    Sends a POST request to:
    /mgmt/tm/util/bash

-    Payload triggers execution of the specified shell command.

## Mitigation

-    Upgrade to patched F5 BIG-IP versions as recommended by F5 Security Advisory.

-    Restrict access to iControl REST interface.

## License

This exploit script is provided for educational purposes only. Usage is entirely at your own risk.

## Official Channels

- [YouTube @rootctf](https://www.youtube.com/@rootctf)
- [X @r0otk3r](https://x.com/r0otk3r)
文件快照

[4.0K] /data/pocs/154be6ca0153b301cacdb338cc11fc0e105b0b90 ├── [2.7K] cve_2022_1388_exploit.py └── [2.3K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。