mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
5.4 KiB
5.4 KiB
CVE-2021-22986
Description
On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 amd BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2, the iControl REST interface has an unauthenticated remote command execution vulnerability. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
POC
Reference
- http://packetstormsecurity.com/files/162059/F5-iControl-Server-Side-Request-Forgery-Remote-Command-Execution.html
- http://packetstormsecurity.com/files/162066/F5-BIG-IP-16.0.x-Remote-Code-Execution.html
Github
- https://github.com/0day404/vulnerability-poc
- https://github.com/189569400/Meppo
- https://github.com/1n7erface/PocList
- https://github.com/20142995/Goby
- https://github.com/20142995/nuclei-templates
- https://github.com/20142995/sectool
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Al1ex/CVE-2021-22986
- https://github.com/AnonymouID/POC
- https://github.com/ArrestX/--POC
- https://github.com/Astrogeorgeonethree/Starred
- https://github.com/Astrogeorgeonethree/Starred2
- https://github.com/Atem1988/Starred
- https://github.com/DDestinys/CVE-2021-22986
- https://github.com/DNTYO/F5_Vulnerability
- https://github.com/EdgeSecurityTeam/Vulnerability
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/HimmelAward/Goby_POC
- https://github.com/Holyshitbruh/2022-2021-F5-BIG-IP-IQ-RCE
- https://github.com/Holyshitbruh/2022-2021-RCE
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/MrCl0wnLab/Nuclei-Template-Exploit-F5-BIG-IP-iControl-REST-Auth-Bypass-RCE-Command-Parameter
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Osyanina/westone-CVE-2021-22986-scanner
- https://github.com/S1xHcL/f5_rce_poc
- https://github.com/SYRTI/POC_to_review
- https://github.com/SexyBeast233/SecBooks
- https://github.com/SouthWind0/southwind0.github.io
- https://github.com/Tas9er/CVE-2021-22986
- https://github.com/Threekiii/Awesome-POC
- https://github.com/TrojanAZhen/Self_Back
- https://github.com/Udyz/CVE-2021-22986-SSRF2RCE
- https://github.com/WhooAmii/POC_to_review
- https://github.com/WingsSec/Meppo
- https://github.com/Yang0615777/PocList
- https://github.com/Z0fhack/Goby_POC
- https://github.com/ZephrFish/CVE-2021-22986_Check
- https://github.com/amitlttwo/CVE-2021-22986
- https://github.com/apachecn-archive/Middleware-Vulnerability-detection
- https://github.com/bfengj/CTF
- https://github.com/bhassani/Recent-CVE
- https://github.com/bigblackhat/oFx
- https://github.com/bytecaps/CVE-2022-1388-EXP
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/doocop/CVE-2022-1388-EXP
- https://github.com/dorkerdevil/CVE-2021-22986-Poc
- https://github.com/dotslashed/CVE-2021-22986
- https://github.com/gmatuz/inthewilddb
- https://github.com/hktalent/bug-bounty
- https://github.com/huike007/penetration_poc
- https://github.com/huydung26/CVE-2021-22986
- https://github.com/jsongmax/F5-BIG-IP-TOOLS
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/kiri-48/CVE-2021-22986
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
- https://github.com/luck-ying/Library-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/merlinepedra25/AttackWebFrameworkTools-5.0
- https://github.com/microvorld/CVE-2021-22986
- https://github.com/n1sh1th/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/openx-org/BLEN
- https://github.com/papa-anniekey/CustomSignatures
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/r0eXpeR/supplier
- https://github.com/s-ribeiro/Modsecurity-Rules
- https://github.com/safesword/F5_RCE
- https://github.com/saucer-man/exploit
- https://github.com/shanyuhe/YesPoc
- https://github.com/soosmile/POC
- https://github.com/superfish9/pt
- https://github.com/takeboy/https-github.com-taomujian-linbing
- https://github.com/taomujian/linbing
- https://github.com/trhacknon/Pocingit
- https://github.com/triw0lf/Security-Matters-22
- https://github.com/tzwlhack/Vulnerability
- https://github.com/west9b/F5-BIG-IP-POC
- https://github.com/whoforget/CVE-POC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xanszZZ/pocsuite3-poc
- https://github.com/xinyisleep/pocscan
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yaunsky/CVE-202122986-EXP
- https://github.com/yhy0/ExpDemo-JavaFX
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve
- https://github.com/zmylml/yangzifun