Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-1388 PoC — F5 BIG-IP 访问控制错误漏洞

Source
Associated Vulnerability
Title:F5 BIG-IP 访问控制错误漏洞 (CVE-2022-1388)
Description:F5 BIG-IP是美国F5公司的一款集成了网络流量管理、应用程序安全管理、负载均衡等功能的应用交付平台。 F5 BIG-IP 存在访问控制错误漏洞,攻击者可以通过未公开的请求利用该漏洞绕过BIG-IP中的iControl REST身份验证来控制受影响的系统。
Description
This repository consists of the python exploit for CVE-2022-1388 (F5's BIG-IP Authentication Bypass to RCE) 
Readme
# CVE-2022-1388
This repository conssists of the python exploit code for CVE-2022-1388( F5's BIG-IP RCE) 

usage: exploit.py [-h] -t TARGET -p PORT -c CMD [--ssl]

options:\
  -h, --help            show this help message and exit\
  -t TARGET, --target TARGET
                        Specify the IP Address/Domain Name of the vulnerable server\
  -p PORT, --port PORT  Specify port number of the vulnerable server\
  -c CMD, --cmd CMD     Specify the command that you want to execute\
  --ssl                 Specify this optional argument if the server uses ssl
  
  Example -
  For a webserber that uses HTTPS and runs on port 8443 at 192.168.0.13\
  ./exploit.py -t 192.168.0.13 -p 8443 -c 'id' --ssl
  
  For a webserver that uses HTTP and runs on port 1346 at 192.168.0.13\
  ./exploit.py -t 192.168.0.13 -p 1346 -c 'id'
File Snapshot

[4.0K] /data/pocs/748c7f50aba52f177e175a31efdecefdcbf5748f ├── [1.8K] exploit.py └── [ 826] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.