Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-5902 PoC — F5 BIG-IP 路径遍历漏洞

Source
Associated Vulnerability
Title:F5 BIG-IP 路径遍历漏洞 (CVE-2020-5902)
Description:In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.
Description
BIGIP CVE-2020-5902 Exploit POC and automation scanning vulnerability
Readme
# CVE-2020-5902
BIG-IP CVE-2020-5902 Exploit POC and automation scanning vulnerability

![Alt text](https://github.com/z3n70/CVE-2020-5902/blob/main/big-ip-exploit.png?raw=true "big-ip-exploit")

simple program for exploit big-ip and automation scanning vulnerability

#install
- gem install httparty
- gem install colorize
- gem install timeout

ruby big-ip.rb list.txt output.txt
File Snapshot

[4.0K] /data/pocs/809cff63a0f04874b76f0c0a9ebe597725b1cc7a ├── [379K] big-ip-exploit.png ├── [1.3K] big-ip.rb ├── [ 969] list01.txt ├── [ 0] output.txt ├── [ 918] payload └── [ 382] README.md 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →