Rapid7 Vulnerability & Exploit Database

F5 BIG-IP iControl CSRF File Write SOAP API

Back to Search

F5 BIG-IP iControl CSRF File Write SOAP API

Disclosed
11/16/2022
Created
11/19/2022

Description

This module exploits a cross-site request forgery (CSRF) vulnerability in F5 Big-IP's iControl interface to write an arbitrary file to the filesystem. While any file can be written to any location as root, the exploitability is limited by SELinux; the vast majority of writable locations are unavailable. By default, we write to a script that executes at reboot, which means the payload will execute the next time the server boots. An alternate target - Login - will add a backdoor that executes next time a user logs in interactively. This overwrites a file, but we restore it when we get a session Note that because this is a CSRF vulnerability, it starts a web server, but an authenticated administrator must visit the site, which redirects them to the target.

Author(s)

  • Ron Bowes

Platform

Linux,Unix

Architectures

cmd

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/linux/http/f5_icontrol_soap_csrf_rce_cve_2022_41622
msf exploit(f5_icontrol_soap_csrf_rce_cve_2022_41622) > show targets
    ...targets...
msf exploit(f5_icontrol_soap_csrf_rce_cve_2022_41622) > set TARGET < target-id >
msf exploit(f5_icontrol_soap_csrf_rce_cve_2022_41622) > show options
    ...show and set options...
msf exploit(f5_icontrol_soap_csrf_rce_cve_2022_41622) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;