GithubHelp home page GithubHelp logo

f5-cve-2022-1388-exploit's Introduction

F5-CVE-2022-1388-Exploit

Exploit and Check Script for CVE 2022-1388

Usage

Check against single host

python3 CVE-2022-1388.py -v true -u target_url

Attack host and test command

python CVE_2022_1388.py -a true -u target_url -c command 

Attack list of hosts

python CVE_2022_1388.py -s true -f file

masscheck.py will take a file input and check the hosts are vulnerable without exploiting them.

Issues

If you have an issue, create a pull request and fix it up, I'm not supporting this tool :).

Detection:

Scanning for /mgmt/tm/util/bash as an endpoint, likely to be in web server logs. Or if you have a F5 go patch it, the affected versions are shown below and the patch is available here https://support.f5.com/csp/article/K23605346

Vulnerable Versions

  • BIG-IP versions 16.1.0 to 16.1.2 (Patch released)
  • BIG-IP versions 15.1.0 to 15.1.5 (Patch released)
  • BIG-IP versions 14.1.0 to 14.1.4 (Patch released)
  • BIG-IP versions 13.1.0 to 13.1.4 (Patch released)
  • BIG-IP versions 12.1.0 to 12.1.6 (End of Support)
  • BIG-IP versions 11.6.1 to 11.6.5 (End of Support)

f5-cve-2022-1388-exploit's People

Contributors

blackap3rture avatar oppastoppa31 avatar zephrfish avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar

f5-cve-2022-1388-exploit's Issues

url access exception

I am trying to scan an ipv6 based host.. the exploit is popping the following message:
url access exception

getting artr errors

shell_model = args.shell
AttributeError: 'Namespace' object has no attribute 'shell'

Doesn't properly identify vulnerable hosts

The script doesn't seem to properly identify vulnerable hosts. It always returns not vulnerable on known vulnerable hosts with a response that is not 200.

{"code":401,"message":"Authorization failed: no user authentication header or token detected. Uri:http://localhost:8100/mgmt/tm/util/bash Referrer:[redacted] Sender:[redacted]","referer":"[redacted]","restOperationId":7273168,"kind":":resterrorresponse"}

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.