xDay Exploit
v10
today : | at : | safemode : ON
> / home / facebook / twitter / exit /
name author perms com modified label

F5 Big-IP - Unauthenticated rsync Access Unknown rwxr-xr-x 0 10:15 AM

Filename F5 Big-IP - Unauthenticated rsync Access
Permission rw-r--r--
Author Unknown
Date and Time 10:15 AM
Label
Action
When configured in a high availability mode, the F5 solution suffers from an unauthenticated rsync access vulnerability that can be leveraged to upload a malicious SSH key and gain remote root access to the appliance.
The BigIP platform configures an rsync daemon listening on the ConfigSync interfaces when the system is configured in a failover mode. The rsync daemon as currently configured does not require any authentication and the “cmi” module has complete read/write access to the system. If the ConfigSync IP addresses are accessible by a malicious third party, it is possible to upload an authorized_keys file directly into the /var/ssh/root directory and then open a root SSH session on the f5 device.

Advisory: http://www.exploit-db.com/sploits/34465.pdf

0 comments:

Post a Comment

 

xDay Exploit By : Anass Ibn El Farouk