关联漏洞
标题:
F5 BIG-IP 访问控制错误漏洞
(CVE-2022-1388)
描述:F5 BIG-IP是美国F5公司的一款集成了网络流量管理、应用程序安全管理、负载均衡等功能的应用交付平台。 F5 BIG-IP 存在访问控制错误漏洞,攻击者可以通过未公开的请求利用该漏洞绕过BIG-IP中的iControl REST身份验证来控制受影响的系统。
介绍
# CVE-2022-1388 - F5 BIG-IP iControl REST Authentication Bypass RCE
This Python script exploits CVE-2022-1388, a critical vulnerability in F5 BIG-IP iControl REST that allows **unauthenticated remote command execution** via improper access control and HTTP header handling.
> ⚠️ **For educational and authorized security research only. Do not use against systems you do not own or have explicit permission to test.**
## Vulnerability Summary
- **CVE ID:** [CVE-2022-1388](https://nvd.nist.gov/vuln/detail/CVE-2022-1388)
- **Vendor:** F5 Networks
- **Affected Product:** BIG-IP (various versions)
- **Impact:** Remote attackers can bypass authentication and execute arbitrary system commands via crafted HTTP requests.
---
## Features
- Remote command execution via REST API
- Optional interactive shell (`--shell`)
- Custom HTTP basic authentication support
- SSL verification disabled (for self-signed certs)
---
## Usage
```bash
python3 cve_2022_1388_exploit.py -u <target_url> -c "<command>"
```
## Examples
#### Run a Single Command
```bash
python3 cve_2022_1388_exploit.py -u https://192.168.1.1 -c "id"
```
<img width="1351" height="148" alt="id" src="https://github.com/user-attachments/assets/6a6fe86f-c5d5-42a4-b7c1-8d7030dc14a9" />
---
#### Run with Custom Credentials
```bash
python3 cve_2022_1388_exploit.py -u https://192.168.1.1 -a "root:password" -c "whoami"
```
<img width="1352" height="146" alt="whoa" src="https://github.com/user-attachments/assets/b5b7f9d6-43d8-48fc-bd07-39e3bc6d378b" />
----
### Start Interactive Shell
```bash
python3 cve_2022_1388_exploit.py -u https://192.168.1.1 --shell
```
<img width="1352" height="417" alt="shell" src="https://github.com/user-attachments/assets/319618d9-7d5c-47fe-b30b-21bf0483a80e" />
---
### How It Works
- The script bypasses auth by setting a forged X-F5-Auth-Token and Authorization headers.
- Sends a POST request to:
/mgmt/tm/util/bash
- Payload triggers execution of the specified shell command.
## Mitigation
- Upgrade to patched F5 BIG-IP versions as recommended by F5 Security Advisory.
- Restrict access to iControl REST interface.
## License
This exploit script is provided for educational purposes only. Usage is entirely at your own risk.
## Official Channels
- [YouTube @rootctf](https://www.youtube.com/@rootctf)
- [X @r0otk3r](https://x.com/r0otk3r)
文件快照
[4.0K] /data/pocs/154be6ca0153b301cacdb338cc11fc0e105b0b90
├── [2.7K] cve_2022_1388_exploit.py
└── [2.3K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。