An open API service providing repository metadata for many open source software ecosystems.

GitHub / MrCl0wnLab / Nuclei-Template-Exploit-F5-BIG-IP-iControl-REST-Auth-Bypass-RCE-Command-Parameter

CVE-2022-1388 is an authentication bypass vulnerability in the REST component of BIG-IP’s iControl API that was assigned a CVSSv3 score of 9.8. The iControl REST API is used for the management and configuration of BIG-IP devices. CVE-2022-1388 could be exploited by an unauthenticated attacker with network access to the management port or self IP addresses of devices that use BIG-IP. Exploitation would allow the attacker to execute arbitrary system commands, create and delete files and disable services.

JSON API: http://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/MrCl0wnLab%2FNuclei-Template-Exploit-F5-BIG-IP-iControl-REST-Auth-Bypass-RCE-Command-Parameter

Stars: 7
Forks: 0
Open issues: 0

License: None
Language:
Size: 6.84 KB
Dependencies parsed at: Pending

Created at: almost 3 years ago
Updated at: 10 months ago
Pushed at: almost 3 years ago
Last synced at: about 1 month ago

Topics: bigip, bigip-rest-api, cve-2022-1388, exploit, f5-bigip, nuclei, nuclei-templates

    Loading...