Use the "API key" from the profile page as the token
The vuln_id type of the vulnerability (e.g. "NETSCAN", "WEBSCAN")
^[A-Z]{7}$"NETSCAN"
Only show vulnerabilities which have/don"t have exploit capabilities. Setting this to false will only show vulnerabilities without any capabilities.
true
the maximum number of templates to return
100
the offset to start returning templates from. This does not work without the limit parameter
100
OK
The name of the vulnerability
"OS Command Injection"
The type of software affected by the vulnerability
"Web Server"
The vendor of the vulnerable software
"Microsoft"
The product affected by the vulnerability
"Laravel"
The date of the vulnerability
"2020-12-25T00:00:00.000Z"
The codename of the vulnerability
"OMIGOD"
The description of the vulnerability
"We found that the target F5 BIG-IP server is vulnerable to CVE-2020-5902, a Remote Code Execution vulnerability, affecting the Traffic Management User Interface (TMUI) component, which is publicly accessible.\\nThe root cause of this vulnerability consists in a broken parser logic in the Tomcat endpoint. This allows an unauthenticated malicious attacker to access any file stored on the server.\\nWe have detected this by sending a HTTP GET request to the tmui endpoint, containing the /etc/passwd file, and looking for the output of the file in the response."
The steps to reproduce the vulnerability
The public description of the vulnerability
"F5 BIG-IP server is affected by a Remote Code Execution vulnerability, located in the Traffic Management User Interface (TMUI) component, which is publicly accessible.\\nThe root cause of this vulnerability consists in a broken parser logic in the Tomcat endpoint.\\nThis allows an unauthenticated malicious attacker to access any file stored on the server or to execute arbitrary commands on the server."
The risk description of the vulnerability
"The risk exists that a remote unauthenticated attacker can fully compromise the F5 BIG-IP server in order to steal confidential information, install ransomware or pivot to the internal network."
The recommendation of the vulnerability
"We recommend upgrading your F5 BIG-IP server to the latest version."
The public recommendation of the vulnerability
"Upgrade F5 BIG-IP server to the latest version or to a non-vulnerable version listed in K52145254."
The references for the vulnerability
"<a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5902\" target=\"_blank\">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5902</a><br><a href=\"https://pentest-tools.com/blog/big-ip-tmui-rce/\" target=\"_blank\">https://pentest-tools.com/blog/big-ip-tmui-rce/</a><br><a href=\"https://www.ptsecurity.com/ww-en/about/news/f5-fixes-critical-vulnerability-discovered-by-positive-technologies-in-big-ip-application-delivery-controller/\" target=\"_blank\">https://www.ptsecurity.com/ww-en/about/news/f5-fixes-critical-vulnerability-discovered-by-positive-technologies-in-big-ip-application-delivery-controller/</a><br><a href=\"https://research.nccgroup.com/2020/07/12/understanding-the-root-cause-of-f5-networks-k52145254-tmui-rce-vulnerability-cve-2020-5902/\" target=\"_blank\">https://research.nccgroup.com/2020/07/12/understanding-the-root-cause-of-f5-networks-k52145254-tmui-rce-vulnerability-cve-2020-5902/</a>"
["CVE-2021-26855", "CVE-2021-27065"]["RCE", "File Read"]A unique vulnerability identifier
"NETSCAN-SNIPER-CVE-2021-42013-RCE"
Indicated whether the CVEs are part of the CISA Known Exploited Vulnerabilities Catalog
true
The published date of module
"2021-08-04T00:00:00.000Z"
The updated date when module was modified
"2022-05-25T00:00:00.000Z"