Lucene search

K
exploitdbSecurity-Assessment.comEDB-ID:34465
HistoryAug 29, 2014 - 12:00 a.m.

F5 Big-IP - rsync Access

2014-08-2900:00:00
Security-Assessment.com
www.exploit-db.com
41

AI Score

7.4

Confidence

Low

When configured in a high availability mode, the F5 solution suffers from an unauthenticated rsync access vulnerability that can be leveraged to upload a malicious SSH key and gain remote root access to the appliance.
The BigIP platform configures an rsync daemon listening on the ConfigSync interfaces when the system is configured in a failover mode. The rsync daemon as currently configured does not require any authentication and the “cmi” module has complete read/write access to the system. If the ConfigSync IP addresses are accessible by a malicious third party, it is possible to upload an authorized_keys file directly into the /var/ssh/root directory and then open a root SSH session on the f5 device.

Advisory: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34465.pdf

AI Score

7.4

Confidence

Low