Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-5902 PoC — F5 BIG-IP 路径遍历漏洞

Source
Associated Vulnerability
Title:F5 BIG-IP 路径遍历漏洞 (CVE-2020-5902)
Description:F5 BIG-IP是美国F5公司的一款集成了网络流量管理、应用程序安全管理、负载均衡等功能的应用交付平台。 F5 BIG-IP中存在路径遍历漏洞。攻击者可利用该漏洞执行任意的系统命令、创建或删除文件,关闭服务/执行任意的Java代码,可能完全入侵系统。以下产品及版本受到影响:F5 BIG-IP 15.1.0版本,15.0.0版本,14.1.0版本至14.1.2版本,13.1.0版本至13.1.3版本,12.1.0版本至12.1.5版本,11.6.1版本至11.6.5版本。
Readme
# CVE-2020-5902

```
   _______      ________    ___   ___ ___   ___         _____ ___   ___ ___  
  / ____\ \    / /  ____|  |__ \ / _ \__ \ / _ \       | ____/ _ \ / _ \__ \ 
 | |     \ \  / /| |__ ______ ) | | | | ) | | | |______| |__| (_) | | | | ) |
 | |      \ \/ / |  __|______/ /| | | |/ /| | | |______|___ \\__, | | | |/ / 
 | |____   \  /  | |____    / /_| |_| / /_| |_| |       ___) | / /| |_| / /_ 
  \_____|   \/   |______|  |____|\___/____|\___/       |____/ /_/  \___/____|
                                                                             
                                                                              
CVE-2020-5902-Scanner.py
@nsflabs
```   

The F5 BIG-IP Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability.

This vulnerability allows for unauthenticated attackers, or authenticated users, with network access to the TMUI, through the BIG-IP management port and/or Self IPs, to execute arbitrary system commands, create or delete files, disable services, and/or execute arbitrary Java code. 

This is to test if a single remote system is vulnerable to cve-2020-5902.  

### Installation

```
$ git clone https://github.com/nsflabs/CVE-2020-5902.git
$ cd CVE-2020-5902/
$ pip3 install -r requirements.txt
```

### Usage
```
$ python3 cve-2020-5902_scanner.py targetip targetport
```
File Snapshot

[4.0K] /data/pocs/ced1c4d313ae6c1261a6663b996839a6ff76198c ├── [3.9K] cve-2020-5902-Scanner.py ├── [1.4K] README.md └── [ 17] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.