Skip to content

Commit 6021fcf

Browse files
committed
automatic module_metadata_base.json update
1 parent 2cbd1a6 commit 6021fcf

File tree

1 file changed

+64
-0
lines changed

1 file changed

+64
-0
lines changed

db/modules_metadata_base.json

Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56515,6 +56515,70 @@
5651556515
},
5651656516
"needs_cleanup": null
5651756517
},
56518+
"exploit_linux/http/f5_icontrol_rest_ssrf_rce": {
56519+
"name": "F5 iControl REST Unauthenticated SSRF Token Generation RCE",
56520+
"fullname": "exploit/linux/http/f5_icontrol_rest_ssrf_rce",
56521+
"aliases": [
56522+
56523+
],
56524+
"rank": 600,
56525+
"disclosure_date": "2021-03-10",
56526+
"type": "exploit",
56527+
"author": [
56528+
"wvu <wvu@metasploit.com>",
56529+
"Rich Warren"
56530+
],
56531+
"description": "This module exploits a pre-auth SSRF in the F5 iControl REST API's\n /mgmt/shared/authn/login endpoint to generate an X-F5-Auth-Token that\n can be used to execute root commands on an affected BIG-IP or BIG-IQ\n device. This vulnerability is known as CVE-2021-22986.\n\n CVE-2021-22986 affects the following BIG-IP versions:\n\n * 12.1.0 - 12.1.5\n * 13.1.0 - 13.1.3\n * 14.1.0 - 14.1.3\n * 15.1.0 - 15.1.2\n * 16.0.0 - 16.0.1\n\n And the following BIG-IQ versions:\n\n * 6.0.0 - 6.1.0\n * 7.0.0\n * 7.1.0\n\n Tested against BIG-IP Virtual Edition 16.0.1 in VMware Fusion.",
56532+
"references": [
56533+
"CVE-2021-22986",
56534+
"URL-https://support.f5.com/csp/article/K03009991",
56535+
"URL-https://attackerkb.com/assessments/f6b19d24-b24e-4abd-98cf-2988d7424311",
56536+
"URL-https://research.nccgroup.com/2021/03/18/rift-detection-capabilities-for-recent-f5-big-ip-big-iq-icontrol-rest-api-vulnerabilities-cve-2021-22986/"
56537+
],
56538+
"platform": "Linux,Unix",
56539+
"arch": "cmd, x86, x64",
56540+
"rport": 443,
56541+
"autofilter_ports": [
56542+
80,
56543+
8080,
56544+
443,
56545+
8000,
56546+
8888,
56547+
8880,
56548+
8008,
56549+
3000,
56550+
8443
56551+
],
56552+
"autofilter_services": [
56553+
"http",
56554+
"https"
56555+
],
56556+
"targets": [
56557+
"Unix Command",
56558+
"Linux Dropper"
56559+
],
56560+
"mod_time": "2021-03-22 23:54:38 +0000",
56561+
"path": "/modules/exploits/linux/http/f5_icontrol_rest_ssrf_rce.rb",
56562+
"is_install_path": true,
56563+
"ref_name": "linux/http/f5_icontrol_rest_ssrf_rce",
56564+
"check": true,
56565+
"post_auth": true,
56566+
"default_credential": true,
56567+
"notes": {
56568+
"Stability": [
56569+
"crash-safe"
56570+
],
56571+
"Reliability": [
56572+
"repeatable-session"
56573+
],
56574+
"SideEffects": [
56575+
"ioc-in-logs",
56576+
"account-lockouts",
56577+
"artifacts-on-disk"
56578+
]
56579+
},
56580+
"needs_cleanup": null
56581+
},
5651856582
"exploit_linux/http/foreman_openstack_satellite_code_exec": {
5651956583
"name": "Foreman (Red Hat OpenStack/Satellite) bookmarks/create Code Injection",
5652056584
"fullname": "exploit/linux/http/foreman_openstack_satellite_code_exec",

0 commit comments

Comments
 (0)