nomisec
WORKING POC
231 stars
by horizon3ai · remote
https://github.com/horizon3ai/CVE-2022-1388
This is a functional exploit for CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP iControl REST. It leverages a misconfigured endpoint to execute arbitrary commands as root by manipulating headers and sending a crafted JSON payload.
Classification
Working Poc 100%
Target:
F5 BIG-IP iControl REST (multiple versions)
No auth needed
Prerequisites:
Network access to the target's management interface · iControl REST endpoint exposed
nomisec
WORKING POC
92 stars
by doocop · poc
https://github.com/doocop/CVE-2022-1388-EXP
This repository contains a working PoC for CVE-2022-1388, an RCE vulnerability in F5 BIG-IP iControl REST API. It includes both a vulnerability checker and an exploit script capable of executing arbitrary commands and reverse shells.
Classification
Working Poc 95%
Target:
F5 BIG-IP iControl REST API
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP management interface
nomisec
WORKING POC
87 stars
by alt3kx · remote
https://github.com/alt3kx/CVE-2022-1388_PoC
This repository provides a working proof-of-concept for CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP iControl REST interface. The exploit demonstrates remote command execution by leveraging improper authentication handling and specific HTTP headers.
Classification
Working Poc 90%
Target:
F5 BIG-IP (iControl REST interface)
No auth needed
Prerequisites:
Access to the BIG-IP management interface · Network connectivity to the target
nomisec
WORKING POC
83 stars
by 0xf4n9x · remote
https://github.com/0xf4n9x/CVE-2022-1388
This repository contains a Python script that exploits CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP iControl REST, allowing remote command execution (RCE) via unauthenticated access to the `/mgmt/tm/util/bash` endpoint.
Classification
Working Poc 95%
Target:
F5 BIG-IP iControl REST
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP device · Vulnerable version of F5 BIG-IP iControl REST
nomisec
WORKING POC
59 stars
by ZephrFish · remote
https://github.com/ZephrFish/F5-CVE-2022-1388-Exploit
This repository contains a Python-based exploit for CVE-2022-1388, an unauthenticated remote code execution vulnerability in F5 BIG-IP iControl REST API. The exploit includes functionality to check for vulnerability and execute arbitrary commands on affected systems.
Classification
Working Poc 95%
Target:
F5 BIG-IP (versions 16.1.0-16.1.2, 15.1.0-15.1.5, 14.1.0-14.1.4, 13.1.0-13.1.4, 12.1.0-12.1.6, 11.6.1-11.6.5)
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP management interface
nomisec
WORKING POC
58 stars
by sherlocksecurity · poc
https://github.com/sherlocksecurity/CVE-2022-1388-Exploit-POC
This PoC demonstrates an authenticated remote command execution (RCE) vulnerability in F5 BIG-IP via an exposed management interface. The exploit sends a crafted POST request to `/mgmt/tm/util/bash` with a base64-encoded admin credential to execute arbitrary commands (e.g., `id`).
Classification
Working Poc 90%
Target:
F5 BIG-IP (multiple versions, see CVE-2022-1388)
Auth required
Prerequisites:
Network access to BIG-IP management interface (port 8083) · Valid admin credentials (or leaked/default credentials)
nomisec
WORKING POC
54 stars
by numanturle · remote
https://github.com/numanturle/CVE-2022-1388
This repository contains a verified proof-of-concept exploit for CVE-2022-1388, a vulnerability in BIG-IP iControl REST that allows unauthenticated remote command execution via a crafted POST request to the management interface.
Classification
Working Poc 90%
Target:
F5 BIG-IP iControl REST (versions 16.1.0-16.1.2, 15.1.0-15.1.5, 14.1.0-14.1.4, 13.1.0-13.1.4, 12.1.0-12.1.6, 11.6.1-11.6.5)
No auth needed
Prerequisites:
Network access to the BIG-IP management interface · Target system running a vulnerable version of BIG-IP
nomisec
WORKING POC
37 stars
by Al1ex · remote
https://github.com/Al1ex/CVE-2022-1388
This repository contains a functional Python exploit for CVE-2022-1388, an unauthenticated remote command execution vulnerability in F5 BIG-IP and BIG-IQ systems. The exploit includes verification, command execution, batch scanning, and reverse shell capabilities.
Classification
Working Poc 95%
Target:
F5 BIG-IP (12.1.0-12.1.6, 13.1.0-13.1.4, 14.1.0-14.1.4, 15.1.0-15.1.5, 16.1.0-16.1.2), F5 BIG-IQ (11.6.1-11.6.5)
No auth needed
Prerequisites:
Network access to the BIG-IP management port or self IP addresses
nomisec
SCANNER
28 stars
by MrCl0wnLab · infoleak
https://github.com/MrCl0wnLab/Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed
This repository provides a Nuclei template and manual PoC to detect the presence of the BIG-IP iControl REST API endpoint vulnerable to CVE-2022-1388. It checks for a 401 response containing specific error messages, indicating the API is exposed but does not exploit the vulnerability.
Classification
Scanner 90%
Target:
F5 BIG-IP iControl REST (versions affected by CVE-2022-1388)
No auth needed
Prerequisites:
Network access to the BIG-IP management port or self IP addresses
nomisec
SCANNER
25 stars
by jheeree · remote
https://github.com/jheeree/CVE-2022-1388-checker
This repository contains a bash script that checks for the presence of CVE-2022-1388, a vulnerability in F5 BIG-IP iControl REST API. The script scans a list of hosts and reports whether the vulnerable endpoint is exposed.
Classification
Scanner 90%
Target:
F5 BIG-IP iControl REST API
No auth needed
Prerequisites:
List of target hostnames or IPs in a text file
nomisec
WORKING POC
14 stars
by PsychoSec2 · remote
https://github.com/PsychoSec2/CVE-2022-1388-POC
This is a functional PoC for CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP iControl REST. It includes both a test function to verify vulnerability and an interactive shell for remote command execution.
Classification
Working Poc 95%
Target:
F5 BIG-IP iControl REST (multiple versions)
No auth needed
Prerequisites:
Network access to the target's management interface
nomisec
WORKING POC
14 stars
by justakazh · remote
https://github.com/justakazh/CVE-2022-1388
This repository contains a Python-based exploit for CVE-2022-1388, an unauthenticated RCE vulnerability in F5 BIG-IP. The exploit sends crafted HTTP requests with specific headers to trigger command execution via the management interface.
Classification
Working Poc 95%
Target:
F5 BIG-IP (multiple versions)
No auth needed
Prerequisites:
Network access to the BIG-IP management interface · Vulnerable BIG-IP version
nomisec
WORKING POC
12 stars
by Zeyad-Azima · remote
https://github.com/Zeyad-Azima/CVE-2022-1388
This repository contains a Java-based exploit for CVE-2022-1388, an RCE vulnerability in F5 BIG-IP iControl REST. It includes a test API lab and tools for scanning and exploiting the vulnerability.
Classification
Working Poc 95%
Target:
F5 BIG-IP iControl REST
No auth needed
Prerequisites:
Access to the target's management interface · Network connectivity to the target
nomisec
WORKING POC
10 stars
by west9b · remote
https://github.com/west9b/F5-BIG-IP-POC
This repository contains a Go-based PoC for multiple F5 BIG-IP vulnerabilities, including CVE-2022-1388, which allows authentication bypass and remote command execution. The code sends crafted HTTP requests to exploit the vulnerabilities and checks for successful execution.
Classification
Working Poc 90%
Attack Type
Rce | Auth Bypass
Target:
F5 BIG-IP
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP device
nomisec
WORKING POC
8 stars
by qusaialhaddad · remote
https://github.com/qusaialhaddad/F5-BigIP-CVE-2022-1388
This is a functional Python exploit for CVE-2022-1388, an unauthenticated RCE vulnerability in F5 BIG-IP. It leverages improper authentication in the iControl REST interface to execute arbitrary commands via the `/mgmt/tm/util/bash` endpoint.
Classification
Working Poc 95%
Target:
F5 BIG-IP versions 11-16
No auth needed
Prerequisites:
Network access to the BIG-IP management interface
nomisec
WORKING POC
8 stars
by Henry4E36 · remote
https://github.com/Henry4E36/CVE-2022-1388
This PoC exploits CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP iControl REST. It sends a crafted POST request to execute arbitrary commands (e.g., 'id') via the '/mgmt/tm/util/bash' endpoint with a malformed 'X-F5-Auth-Token' header.
Classification
Working Poc 95%
Target:
F5 BIG-IP iControl REST (versions prior to fixed releases)
No auth needed
Prerequisites:
Network access to the BIG-IP management interface
nomisec
SCANNER
7 stars
by blind-intruder · poc
https://github.com/blind-intruder/CVE-2022-1388-RCE-checker-and-POC-Exploit
The repository contains a bash script that checks for the presence of CVE-2022-1388, an RCE vulnerability in F5 BIG-IP. It scans a list of hosts for the exposed iControl REST API endpoint but does not include a functional exploit.
Classification
Scanner 90%
Target:
F5 BIG-IP
No auth needed
Prerequisites:
List of target IPs/hosts
nomisec
WORKING POC
7 stars
by vaelwolf · remote
https://github.com/vaelwolf/CVE-2022-1388
This is a functional exploit for CVE-2022-1388, targeting F5 BIG-IP iControl REST. It allows unauthenticated remote command execution via the /mgmt/tm/util/bash endpoint. The PoC includes options for single command execution, reverse shell, and traffic capture via tcpdump.
Classification
Working Poc 100%
Target:
F5 BIG-IP (iControl REST)
No auth needed
Prerequisites:
Network access to the target BIG-IP system · Python 3.x with requests library
nomisec
WRITEUP
6 stars
by Vulnmachines · remote
https://github.com/Vulnmachines/F5-Big-IP-CVE-2022-1388
This repository contains a writeup and screenshot for CVE-2022-1388, an unauthenticated remote code execution vulnerability in F5 Big-IP. No actual exploit code is provided, only a description and promotional links.
Classification
Writeup 90%
Target:
F5 Big-IP (versions not specified)
No auth needed
Prerequisites:
Network access to vulnerable F5 Big-IP instance
nomisec
WORKING POC
6 stars
by MrCl0wnLab · poc
https://github.com/MrCl0wnLab/Nuclei-Template-Exploit-F5-BIG-IP-iControl-REST-Auth-Bypass-RCE-Command-Parameter
This repository provides a Nuclei template and manual PoC for exploiting CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP iControl REST API. The exploit allows unauthenticated attackers to execute arbitrary system commands via crafted HTTP requests.
Classification
Working Poc 90%
Target:
F5 BIG-IP iControl REST API
No auth needed
Prerequisites:
Network access to the BIG-IP management port or self IP addresses
nomisec
WORKING POC
6 stars
by 0x7eTeam · poc
https://github.com/0x7eTeam/CVE-2022-1388-PocExp
This PoC exploits CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP iControl REST API, allowing unauthenticated remote command execution via crafted HTTP requests. It includes checks for vulnerability and command execution capabilities.
Classification
Working Poc 95%
Target:
F5 BIG-IP iControl REST API
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP device · iControl REST API exposed
nomisec
SCANNER
5 stars
by AmirHoseinTangsiriNET · remote
https://github.com/AmirHoseinTangsiriNET/CVE-2022-1388-Scanner
This repository contains a Python-based scanner for detecting CVE-2022-1388, a vulnerability in F5 BIG-IP iControl REST. The scanner sends a POST request to the vulnerable endpoint to check if the target is susceptible to remote command execution (RCE).
Classification
Scanner 90%
Target:
F5 BIG-IP iControl REST
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP device
nomisec
WORKING POC
5 stars
by Stonzyy · remote
https://github.com/Stonzyy/Exploit-F5-CVE-2022-1388
This repository contains a PoC exploit for CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP. The scripts demonstrate command injection via the management interface, allowing remote code execution (RCE) by sending a crafted HTTP request to the `/mgmt/tm/util/bash` endpoint.
Classification
Working Poc 95%
Target:
F5 BIG-IP (versions 16.1.0-16.1.2, 15.1.0-15.1.5, 14.1.0-14.1.4, 13.1.0-13.1.4, 12.1.0-12.1.6, 11.6.1-11.6.5)
No auth needed
Prerequisites:
Network access to the F5 BIG-IP management interface · Vulnerable version of F5 BIG-IP
nomisec
SCANNER
5 stars
by gotr00t0day · remote
https://github.com/gotr00t0day/CVE-2022-1388
This repository contains a scanner for CVE-2022-1388, which exploits an authentication bypass in F5 BIG-IP's iControl REST API to execute arbitrary commands. The script uses Shodan to find potential targets and attempts to verify vulnerability by sending a test command.
Classification
Scanner 90%
Target:
F5 BIG-IP (iControl REST API)
No auth needed
Prerequisites:
Shodan API key · Network access to target systems
nomisec
WORKING POC
5 stars
by Angus-Team · remote
https://github.com/Angus-Team/F5-BIG-IP-RCE-CVE-2022-1388
This repository contains a Python script that exploits CVE-2022-1388, an RCE vulnerability in F5 BIG-IP. The script allows for single URL exploitation, batch URL scanning with multithreading, and command execution on vulnerable targets.
Classification
Working Poc 95%
Target:
F5 BIG-IP (iControl REST interface)
No auth needed
Prerequisites:
Network access to the target's management interface · iControl REST interface exposed
nomisec
WORKING POC
4 stars
by bandit92 · poc
https://github.com/bandit92/CVE2022-1388_TestAPI
This repository provides a test API to simulate the vulnerability described in CVE-2022-1388, which allows remote command execution via the F5 BIG-IP management interface. The main.py file implements a FastAPI endpoint that mimics the vulnerable endpoint and executes bash commands provided in the request.
Classification
Working Poc 90%
Target:
F5 BIG-IP (simulated)
No auth needed
Prerequisites:
Access to the vulnerable endpoint · Ability to send HTTP POST requests
nomisec
WORKING POC
3 stars
by nvk0x · remote
https://github.com/nvk0x/CVE-2022-1388-exploit
This exploit targets CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP iControl REST. It sends a crafted POST request to execute arbitrary commands via the `/mgmt/tm/util/bash` endpoint by manipulating headers and JSON payload.
Classification
Working Poc 95%
Target:
F5 BIG-IP iControl REST (versions 13.x, 14.x, 15.x, 16.x, 17.x)
No auth needed
Prerequisites:
Network access to the target's management interface · BIG-IP iControl REST interface exposed
nomisec
WORKING POC
3 stars
by revanmalang · remote
https://github.com/revanmalang/CVE-2022-1388
This repository contains a Python-based exploit for CVE-2022-1388, an unauthenticated RCE vulnerability in F5 BIG-IP. The exploit sends crafted HTTP requests with specific headers to trigger command execution via the management interface.
Classification
Working Poc 95%
Target:
F5 BIG-IP (multiple versions)
No auth needed
Prerequisites:
Network access to the F5 BIG-IP management interface
nomisec
WORKING POC
2 stars
by devengpk · remote
https://github.com/devengpk/CVE-2022-1388
This repository contains a functional exploit for CVE-2022-1388, an RCE vulnerability in F5 BIG-IP iControl REST API. The exploit sends crafted JSON payloads to the `/mgmt/tm/util/bash` endpoint to execute arbitrary commands. It includes both single-target and mass-checking capabilities.
Classification
Working Poc 95%
Target:
F5 BIG-IP (versions 16.1.0-16.1.2, 15.1.0-15.1.5, 14.1.0-14.1.4, 13.1.0-13.1.4, 12.1.0-12.1.6, 11.6.1-11.6.5)
No auth needed
Prerequisites:
Network access to the BIG-IP management interface · Exposed `/mgmt/tm/util/bash` endpoint
nomisec
WORKING POC
2 stars
by superzerosec · remote
https://github.com/superzerosec/CVE-2022-1388
This is a functional exploit for CVE-2022-1388, an RCE vulnerability in F5 BIG-IP iControl REST. It sends a crafted POST request to execute arbitrary commands via the `/mgmt/tm/util/bash` endpoint with hardcoded credentials.
Classification
Working Poc 95%
Target:
F5 BIG-IP iControl REST (versions 16.1.0-16.1.2, 15.1.0-15.1.5, 14.1.0-14.1.4, 13.1.0-13.1.4, 12.1.0-12.1.6)
Auth required
Prerequisites:
Network access to the BIG-IP management interface · iControl REST endpoint exposed
nomisec
SCANNER
2 stars
by SecTheBit · remote
https://github.com/SecTheBit/CVE-2022-1388
This repository provides a Nuclei template for detecting CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP. The PoC uses a template to check for the presence of sensitive files like '/etc/shadow' or '/etc/passwd' as proof of exploitation.
Classification
Scanner 80%
Target:
F5 BIG-IP (versions affected by CVE-2022-1388)
No auth needed
Prerequisites:
Access to the target F5 BIG-IP management interface or iControl REST endpoint
nomisec
WORKING POC
2 stars
by savior-only · remote
https://github.com/savior-only/CVE-2022-1388
This PoC exploits CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP iControl REST, allowing unauthenticated remote command execution via a crafted HTTP request to the `/mgmt/tm/util/bash` endpoint.
Classification
Working Poc 95%
Target:
F5 BIG-IP iControl REST
No auth needed
Prerequisites:
Network access to the target BIG-IP device · iControl REST interface exposed
nomisec
WORKING POC
2 stars
by saucer-man · remote
https://github.com/saucer-man/CVE-2022-1388
This repository contains a Python-based exploit for CVE-2022-1388, an unauthenticated RCE vulnerability in F5 BIG-IP iControl REST. The exploit leverages an authentication bypass to execute arbitrary commands as root via the `/mgmt/tm/util/bash` endpoint.
Classification
Working Poc 95%
Target:
F5 BIG-IP iControl REST (versions affected by CVE-2022-1388)
No auth needed
Prerequisites:
Network access to the target BIG-IP management interface
github
WORKING POC
2 stars
by Pr0t0c01 · pythonpoc
https://github.com/Pr0t0c01/CVEs/tree/main/BigIP_CVE-2022-1388
The repository contains a functional exploit for CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP's iControl REST API. It includes a Nuclei template and manual PoC using crafted HTTP requests to achieve RCE via the `/mgmt/tm/util/bash` endpoint.
Classification
Working Poc 95%
Target:
F5 BIG-IP iControl REST API
No auth needed
Prerequisites:
network access to BIG-IP management port/self IP
nomisec
WORKING POC
2 stars
by aancw · remote
https://github.com/aancw/CVE-2022-1388-rs
This repository contains a working proof-of-concept exploit for CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP iControl REST. The exploit leverages a misconfiguration in the REST endpoint to execute arbitrary commands via the `/mgmt/tm/util/bash` endpoint.
Classification
Working Poc 95%
Target:
F5 BIG-IP iControl REST
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP device · The target must be vulnerable to CVE-2022-1388
nomisec
SCANNER
2 stars
by EvilLizard666 · remote
https://github.com/EvilLizard666/CVE-2022-1388
The repository contains a scanner for CVE-2022-1388, an RCE vulnerability in F5 BIG-IP. It checks for vulnerability by sending a crafted POST request to the `/mgmt/tm/util/bash` endpoint on ports 443 and 8443, attempting to execute a command to read `/etc/passwd`.
Classification
Scanner 90%
Target:
F5 BIG-IP (versions affected by CVE-2022-1388)
No auth needed
Prerequisites:
List of target IPs/URLs · Network access to ports 443/8443 on target systems
nomisec
WORKING POC
1 stars
by ThinkingOffensively · poc
https://github.com/ThinkingOffensively/CVE-2022-1388
This PoC demonstrates an authentication bypass vulnerability in F5 BIG-IP's iControl REST interface, allowing arbitrary command execution via a crafted cURL request. The exploit leverages invalid credentials in the Authorization header to bypass authentication and execute commands through the `/mgmt/tm/util/bash` endpoint.
Classification
Working Poc 100%
Target:
F5 BIG-IP 16.1.x < 16.1.2.2, 15.1.x < 15.1.5.1, 14.1.x < 14.1.4.6, 13.1.x < 13.1.5, 12.1.x, 11.6.x
No auth needed
Prerequisites:
Network access to the target BIG-IP management interface · cURL or similar HTTP client
nomisec
WORKING POC
1 stars
by amitlttwo · remote
https://github.com/amitlttwo/CVE-2022-1388
This repository contains a functional Python exploit for CVE-2022-1388, an authentication bypass leading to remote code execution (RCE) in F5 BIG-IP iControl REST. The exploit sends a crafted HTTP POST request to bypass authentication and execute arbitrary commands via the `/mgmt/tm/util/bash` endpoint.
Classification
Working Poc 100%
Target:
F5 BIG-IP iControl REST
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP device · iControl REST interface exposed
nomisec
WORKING POC
1 stars
by iveresk · remote
https://github.com/iveresk/cve-2022-1388-1veresk
This repository contains a functional proof-of-concept exploit for CVE-2022-1388, an RCE vulnerability in F5 BIG-IP. The script sends a crafted POST request to the vulnerable endpoint `/mgmt/tm/util/bash` with malicious headers and a JSON payload to execute arbitrary commands.
Classification
Working Poc 95%
Target:
F5 BIG-IP (versions affected by CVE-2022-1388)
No auth needed
Prerequisites:
Network access to the vulnerable BIG-IP management interface · Target must be unpatched for CVE-2022-1388
nomisec
WORKING POC
1 stars
by j-baines · remote
https://github.com/j-baines/tippa-my-tongue
This exploit leverages CVE-2022-1388 (authentication bypass) and CVE-2022-41800 (command injection) to achieve a root reverse shell on F5 BIG-IP devices. It uses the `/mgmt/shared/iapp/rpm-spec-creator` and `/mgmt/shared/iapp/build-package` endpoints to execute arbitrary commands via a crafted RPM spec file.
Classification
Working Poc 100%
Target:
F5 BIG-IP (tested on 16.1.2.1)
No auth needed
Prerequisites:
Network access to the BIG-IP management interface · Python 3 with `requests` library
nomisec
WORKING POC
1 stars
by chesterblue · remote
https://github.com/chesterblue/CVE-2022-1388
This exploit targets CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP iControl REST. It sends a crafted POST request to execute arbitrary commands via the `/mgmt/tm/util/bash` endpoint by leveraging improper authentication handling.
Classification
Working Poc 95%
Target:
F5 BIG-IP iControl REST (versions 16.1.0-16.1.2, 15.1.0-15.1.5, 14.1.0-14.1.4, 13.1.0-13.1.4, 12.1.0-12.1.6, 11.6.1-11.6.5)
No auth needed
Prerequisites:
Network access to the target BIG-IP management interface
nomisec
WORKING POC
1 stars
by nico989 · remote
https://github.com/nico989/CVE-2022-1388
This repository contains a functional PoC for CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP. The script includes both scanning and exploitation capabilities, allowing arbitrary command execution via the BIG-IP management interface.
Classification
Working Poc 95%
Target:
F5 BIG-IP (multiple versions)
No auth needed
Prerequisites:
Network access to the BIG-IP management interface · List of target IPs in a file
nomisec
WORKING POC
1 stars
by Luchoane · remote
https://github.com/Luchoane/CVE-2022-1388_refresh
This is a functional PoC for CVE-2022-1388, an RCE vulnerability in F5 BIG-IP. It exploits an authentication bypass in the iControl REST interface to execute arbitrary commands via the `/mgmt/tm/util/bash` endpoint.
Classification
Working Poc 95%
Target:
F5 BIG-IP (multiple versions)
No auth needed
Prerequisites:
Network access to the BIG-IP management interface
nomisec
WORKING POC
1 stars
by Chocapikk · remote
https://github.com/Chocapikk/CVE-2022-1388
This repository contains a Python-based exploit for CVE-2022-1388, an RCE vulnerability in F5 BIG-IP. The exploit sends a crafted JSON payload to the `/mgmt/tm/util/bash` endpoint to execute arbitrary commands on vulnerable systems.
Classification
Working Poc 95%
Target:
F5 BIG-IP (versions 16.1.0-16.1.2, 15.1.0-15.1.5, 14.1.0-14.1.4, 13.1.0-13.1.4, 12.1.0-12.1.6, 11.6.1-11.6.5)
No auth needed
Prerequisites:
Network access to the target BIG-IP management interface
nomisec
WORKING POC
1 stars
by 0xAgun · remote
https://github.com/0xAgun/CVE-2022-1388
This exploit targets CVE-2022-1388, an RCE vulnerability in F5 BIG-IP iControl REST. It sends a crafted POST request to execute arbitrary commands via the `/mgmt/tm/util/bash` endpoint.
Classification
Working Poc 90%
Target:
F5 BIG-IP iControl REST (versions 16.1.0-16.1.2, 15.1.0-15.1.5, 14.1.0-14.1.4, 13.1.0-13.1.4, 12.1.0-12.1.6)
Auth required
Prerequisites:
Network access to the target BIG-IP management interface · Valid credentials (default or compromised)
nomisec
WORKING POC
1 stars
by vesperp · poc
https://github.com/vesperp/CVE-2022-1388-F5-BIG-IP
This PoC exploits CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP, by sending a crafted POST request to execute arbitrary commands via the management interface. The script reads target URLs from a file and checks for vulnerability by running the 'id' command.
Classification
Working Poc 90%
Target:
F5 BIG-IP (multiple versions)
No auth needed
Prerequisites:
Target URL list in 'target.txt' · Network access to F5 BIG-IP management interface
nomisec
WORKING POC
1 stars
by iveresk · remote
https://github.com/iveresk/cve-2022-1388-iveresk-command-shell
This is a functional Python-based PoC for CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP iControl REST. It exploits improper header handling to execute arbitrary commands via an interactive shell or single command execution.
Classification
Working Poc 95%
Target:
F5 BIG-IP iControl REST (multiple versions)
No auth needed
Prerequisites:
Network access to the target's management interface · Target must be unpatched for CVE-2022-1388
nomisec
WORKING POC
1 stars
by yukar1z0e · remote
https://github.com/yukar1z0e/CVE-2022-1388
This PoC exploits CVE-2022-1388, an unauthenticated RCE vulnerability in F5 BIG-IP iControl REST. It sends a crafted POST request to execute arbitrary commands (e.g., 'whoami') via the management interface.
Classification
Working Poc 95%
Target:
F5 BIG-IP (iControl REST)
No auth needed
Prerequisites:
Network access to BIG-IP management port/self IP · BIG-IP vulnerable to CVE-2022-1388
nomisec
WORKING POC
1 stars
by shamo0 · remote
https://github.com/shamo0/CVE-2022-1388
This repository contains a Python script that exploits CVE-2022-1388, an unauthenticated remote command execution vulnerability in F5 BIG-IP iControl REST. The script sends a crafted POST request to execute arbitrary commands on vulnerable systems.
Classification
Working Poc 95%
Target:
F5 BIG-IP (versions 11.x-16.x, excluding fixed versions)
No auth needed
Prerequisites:
Network access to the BIG-IP management port or self IP addresses
nomisec
WORKING POC
1 stars
by thatonesecguy · remote
https://github.com/thatonesecguy/CVE-2022-1388-Exploit
This repository contains a functional exploit for CVE-2022-1388, an RCE vulnerability in F5 BIG-IP iControl REST API. The exploit sends crafted JSON payloads to execute arbitrary commands via the `/mgmt/tm/util/bash` endpoint.
Classification
Working Poc 95%
Target:
F5 BIG-IP (versions 16.1.0-16.1.2, 15.1.0-15.1.5, 14.1.0-14.1.4, 13.1.0-13.1.4, 12.1.0-12.1.6, 11.6.1-11.6.5)
No auth needed
Prerequisites:
Exposed iControl REST API endpoint · Network access to the target
nomisec
WORKING POC
1 stars
by LinJacck · remote
https://github.com/LinJacck/CVE-2022-1388-EXP
This is a functional exploit for CVE-2022-1388, targeting F5 BIG-IP devices. It includes verification, command execution, batch scanning, and an interactive shell mode, leveraging unauthenticated access to execute arbitrary commands via the management interface.
Classification
Working Poc 95%
Target:
F5 BIG-IP (multiple versions)
No auth needed
Prerequisites:
Network access to the BIG-IP management interface · Target device exposed on the internet or accessible via network
github
WORKING POC
by mangjong · pythonpoc
https://github.com/mangjong/Collection-of-PoC/tree/main/CVE/CVE-2022-1388.py
This Python script exploits CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP iControl REST, allowing unauthenticated remote command execution via the `/mgmt/tm/util/bash` endpoint. The script includes both verification and exploitation capabilities, enabling arbitrary command execution on vulnerable systems.
Classification
Working Poc 100%
Target:
F5 BIG-IP iControl REST
No auth needed
Prerequisites:
Network access to the target BIG-IP management interface
nomisec
SCANNER
by mr-vill4in · remote
https://github.com/mr-vill4in/CVE-2022-1388
This repository contains a scanner for CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP. The script checks if a target is vulnerable by sending a crafted HTTP request and analyzing the response.
Classification
Scanner 90%
Target:
F5 BIG-IP
No auth needed
Prerequisites:
Target URL(s)
nomisec
WORKING POC
by pauloink · remote
https://github.com/pauloink/CVE-2022-1388
This Python script exploits CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP iControl REST, allowing unauthenticated remote command execution via a crafted POST request to the management interface.
Classification
Working Poc 95%
Target:
F5 BIG-IP iControl REST (versions 16.1.0-16.1.2, 15.1.0-15.1.5, 14.1.0-14.1.4, 13.1.0-13.1.4, 12.1.0-12.1.6)
No auth needed
Prerequisites:
Network access to the F5 BIG-IP management interface · Target running a vulnerable version of BIG-IP
nomisec
WORKING POC
by jbharucha05 · remote
https://github.com/jbharucha05/CVE-2022-1388
This is a functional exploit for CVE-2022-1388, an unauthenticated RCE vulnerability in F5 BIG-IP. It sends a crafted POST request to execute arbitrary commands via the management interface.
Classification
Working Poc 100%
Target:
F5 BIG-IP (versions 16.1.0-16.1.2, 15.1.0-15.1.5, 14.1.0-14.1.4, 13.1.0-13.1.4, 12.1.0-12.1.6, 11.6.1-11.6.5)
No auth needed
Prerequisites:
Network access to the BIG-IP management port or self IP addresses
nomisec
SCANNER
by M4fiaB0y · remote
https://github.com/M4fiaB0y/CVE-2022-1388
This repository contains a Python scanner for detecting F5 Big-IP systems vulnerable to CVE-2022-1388. It checks for the presence of a specific error response in the login endpoint to identify vulnerable targets.
Classification
Scanner 95%
Target:
F5 Big-IP (multiple versions)
No auth needed
Prerequisites:
Network access to the target IP range · Python environment with requests library
nomisec
SCANNER
by Hudi233 · remote
https://github.com/Hudi233/CVE-2022-1388
This repository contains a scanner script for CVE-2022-1388, which checks if the F5 BIG-IP iControl REST API is exposed. The script sends a request to the login endpoint and checks for a specific error response to determine vulnerability.
Classification
Scanner 90%
Target:
F5 BIG-IP iControl REST API
No auth needed
Prerequisites:
List of F5 BIG-IP IP addresses in a file named 'F5_IP'
nomisec
WORKING POC
by battleofthebots · remote
https://github.com/battleofthebots/refresh
This repository contains a working PoC for CVE-2022-1388, an authentication bypass leading to RCE in F5 BIG-IP. The exploit leverages improper header handling to access admin endpoints and execute arbitrary commands via the `/mgmt/tm/util/bash` endpoint.
Classification
Working Poc 95%
Target:
F5 BIG-IP (CVE-2022-1388)
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP management interface
gitlab
WORKING POC
by t0adsec · remote
https://gitlab.com/t0adsec/cve-2022-1388-poc
This repository contains a functional Python script that exploits CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP devices. The exploit leverages hop-by-hop header manipulation (Connection header) to bypass authentication and achieve remote code execution via the `/mgmt/tm/util/bash` endpoint.
Classification
Working Poc 95%
Target:
F5 BIG-IP (multiple versions)
No auth needed
Prerequisites:
Network access to the F5 BIG-IP management interface
nomisec
WORKING POC
by li8u99 · poc
https://github.com/li8u99/CVE-2022-1388
This repository contains a functional exploit for CVE-2022-1388, targeting F5 BIG-IP devices. The exploit sends a crafted POST request to the `/mgmt/tm/util/bash` endpoint to achieve remote command execution (RCE) without authentication.
Classification
Working Poc 95%
Target:
F5 BIG-IP (versions 16.1.0-16.1.2, 15.1.0-15.1.5, 14.1.0-14.1.4, 13.1.0-13.1.4, 12.1.0-12.1.6, 11.6.1-11.6.5)
No auth needed
Prerequisites:
Network access to the target BIG-IP management interface
nomisec
WORKING POC
by impost0r · remote
https://github.com/impost0r/CVE-2022-1388
This exploit leverages CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP iControl REST, to execute arbitrary commands via a pseudoshell. It sends crafted requests to the `/mgmt/tm/util/bash` endpoint with manipulated headers to bypass authentication.
Classification
Working Poc 95%
Target:
F5 BIG-IP iControl REST (versions affected by CVE-2022-1388)
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP management interface
nomisec
WORKING POC
by r0otk3r · remote
https://github.com/r0otk3r/CVE-2022-1388
This Python script exploits CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP iControl REST, allowing unauthenticated remote command execution via crafted HTTP requests. It supports both single command execution and interactive shell sessions.
Classification
Working Poc 95%
Target:
F5 BIG-IP (various versions)
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP iControl REST interface
nomisec
WORKING POC
by On-Cyber-War · remote
https://github.com/On-Cyber-War/CVE-2022-1388
This repository provides a cURL one-liner to exploit CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP iControl REST. The exploit sends a crafted request to execute arbitrary commands via the `/mgmt/tm/util/bash` endpoint.
Classification
Working Poc 95%
Target:
F5 BIG-IP (16.1.x < 16.1.2.2, 15.1.x < 15.1.5.1, 14.1.x < 14.1.4.6, 13.1.x < 13.1.5, 12.1.x, 11.6.x)
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP management interface
nomisec
WORKING POC
by omnigodz · remote
https://github.com/omnigodz/CVE-2022-1388
This repository contains a Python exploit for CVE-2022-1388, an RCE vulnerability in F5's BIG-IP. The exploit sends a crafted POST request to the vulnerable endpoint to execute arbitrary commands.
Classification
Working Poc 95%
Target:
F5 BIG-IP
No auth needed
Prerequisites:
Network access to the vulnerable BIG-IP management interface
nomisec
WORKING POC
by sashka3076 · poc
https://github.com/sashka3076/F5-BIG-IP-exploit
This is a functional exploit for CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP iControl REST interface leading to remote code execution. The PoC sends crafted JSON payloads to the `/mgmt/tm/util/bash` endpoint with manipulated headers to bypass authentication and execute arbitrary commands.
Classification
Working Poc 95%
Target:
F5 BIG-IP (iControl REST)
No auth needed
Prerequisites:
Network access to the BIG-IP management interface · iControl REST interface exposed
nomisec
SCANNER
by Osyanina · poc
https://github.com/Osyanina/westone-CVE-2022-1388-scanner
This repository contains a scanner for CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP iControl REST. The provided instructions are minimal and reference a mismatched CVE (2021-21980) in the clone URL, but the README explicitly mentions CVE-2022-1388.
Classification
Scanner 80%
Target:
F5 BIG-IP iControl REST
No auth needed
Prerequisites:
network access to target · iControl REST interface exposed
nomisec
WORKING POC
by Wrin9 · poc
https://github.com/Wrin9/CVE-2022-1388
This repository provides a PoC and exploit for CVE-2022-1388, a vulnerability in F5 BIG-IP. The exploit allows remote command execution (RCE) via the `pocsuite` framework, with options for both testing and executing commands.
Classification
Working Poc 80%
Target:
F5 BIG-IP (versions affected by CVE-2022-1388)
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP management interface · pocsuite framework installed
vulncheck_xdb
WORKING POC
remote
https://github.com/vesperp/CVE-2022-1388-F5-BIG-IP-
This repository contains a functional exploit for CVE-2022-1388, targeting F5 BIG-IP devices. The exploit sends a crafted POST request to the `/mgmt/tm/util/bash` endpoint with a command injection payload to execute arbitrary commands (e.g., `id`).
Classification
Working Poc 95%
Target:
F5 BIG-IP
Auth required
Prerequisites:
target list in `target.txt` · network access to the BIG-IP management interface
vulncheck_xdb
WORKING POC
remote
https://github.com/forktheplanet/CVE-2022-1388
This repository provides a functional cURL one-liner to exploit CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP's iControl REST interface. The exploit allows arbitrary command execution via the `/mgmt/tm/util/bash` endpoint by bypassing authentication with crafted headers.
Classification
Working Poc 100%
Target:
F5 BIG-IP (16.1.x < 16.1.2.2, 15.1.x < 15.1.5.1, 14.1.x < 14.1.4.6, 13.1.x < 13.1.5, all 12.1.x and 11.6.x)
No auth needed
Prerequisites:
network access to the target BIG-IP management interface
exploitdb
WORKING POC
by Yesith Alvarez · pythonremotemultiple
https://www.exploit-db.com/exploits/50932
This exploit targets CVE-2022-1388 in F5 BIG-IP 16.0.x by sending a crafted POST request to the management interface's bash endpoint, executing a reverse shell payload via the 'utilCmdArgs' parameter. It leverages basic authentication and a malformed X-F5-Auth-Token header to bypass authentication.
Classification
Working Poc 100%
Target:
F5 BIG-IP 16.0.x
No auth needed
Prerequisites:
Network access to the BIG-IP management interface · Listener set up for reverse shell
metasploit
WORKING POC
EXCELLENT
by Heyder Andrade · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/f5_icontrol_rce.rb
This Metasploit module exploits CVE-2022-1388, an authentication bypass in F5 BIG-IP iControl REST service, to execute commands as root via the /mgmt/tm/util/bash endpoint. It includes checks for vulnerability and supports both Unix command and Linux dropper payloads.
Classification
Working Poc 100%
Target:
F5 BIG-IP iControl REST
No auth needed
Prerequisites:
Network access to the target's REST interface · Vulnerable F5 BIG-IP version
vulncheck_xdb
WORKING POC
remote
https://github.com/sherlocksecurity/CVE-2022-1388_F5_BIG-IP
The repository contains a functional exploit PoC for CVE-2022-1388, demonstrating an authentication bypass leading to remote command execution on F5 BIG-IP devices via the `/mgmt/tm/util/bash` endpoint. The provided HTTP request includes a crafted `X-F5-Auth-Token` header and a command injection payload.
Classification
Working Poc 95%
Target:
F5 BIG-IP
No auth needed
Prerequisites:
Network access to the target BIG-IP management interface · BIG-IP device with vulnerable configuration
vulncheck_xdb
WORKING POC
remote
https://github.com/MrCl0wnLab/Nuclei-Template-Exploit-CVE-2022-1388-BIG-IP-iControl-REST
This repository contains a functional Nuclei template for exploiting CVE-2022-1388, an authentication bypass vulnerability in F5 BIG-IP iControl REST API. The exploit allows unauthenticated remote command execution by leveraging a crafted HTTP request with a malformed X-F5-Auth-Token header.
Classification
Working Poc 95%
Target:
F5 BIG-IP iControl REST API
No auth needed
Prerequisites:
network access to the BIG-IP management port or self IP addresses
vulncheck_xdb
WORKING POC
remote
https://github.com/v4sh25/CVE_2022_1388
This repository contains a functional exploit for CVE-2022-1388, an RCE vulnerability in F5 BIG-IP. The script sends crafted JSON payloads to the `/mgmt/tm/util/bash` endpoint, allowing command execution via the `utilCmdArgs` parameter.
Classification
Working Poc 95%
Target:
F5 BIG-IP
No auth needed
Prerequisites:
Network access to the BIG-IP management interface