Files
CVEs-PoC/2018/CVE-2018-5511.md
T
2024-06-18 02:51:15 +02:00

20 lines
1.0 KiB
Markdown

### [CVE-2018-5511](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5511)
![](https://img.shields.io/static/v1?label=Product&message=BIG-IP%20(LTM%2C%20AAM%2C%20AFM%2C%20Analytics%2C%20APM%2C%20ASM%2C%20DNS%2C%20Edge%20Gateway%2C%20GTM%2C%20Link%20Controller%2C%20PEM%2C%20WebAccelerator%2C%20WebSafe)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Privilege%20escalation&color=brighgreen)
### Description
On F5 BIG-IP 13.1.0-13.1.0.3 or 13.0.0, when authenticated administrative users execute commands in the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, restrictions on allowed commands may not be enforced.
### POC
#### Reference
- http://packetstormsecurity.com/files/152213/VMware-Host-VMX-Process-Impersonation-Hijack-Privilege-Escalation.html
- https://www.exploit-db.com/exploits/46600/
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/punishell/WindowsLegacyCVE