Add F5 BIG-IP TMUI Directory Traversal and File Upload RCE (CVE-2020-5902)#13807
Add F5 BIG-IP TMUI Directory Traversal and File Upload RCE (CVE-2020-5902)#13807smcintyre-r7 merged 10 commits intorapid7:masterfrom
Conversation
|
Thanks for your pull request! Before this can be merged, we need the following documentation for your module: |
I was wondering why I refactored it away. Oh, I needed it.
Release NotesThe F5 BIG-IP TMUI Directory Traversal and File Upload RCE module exploits a directory traversal vulnerability within the F5 BIG-IP appliance, identified as CVE-2020-5902. The vulnerability is unauthenticated and can be leveraged to obtain remote code execution. |
|
I am getting struck at while running the exploit. Any solution please. I have used the exact payload and set the target to 0 (Unix). |
Merged: https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/f5_bigip_tmui_rce.rb
If you're coming here from the Internet, please use the version in
master(linked above), not the original commit. Thank you! See also: #13854 and #14003.This module should get you a Unix root shell on an affected F5 BIG-IP if all goes well. This is NOT TMSH. It just goes through it. You may need to run the exploit a couple times until I fix the bugs.