curl --request GET \
--url https://app.pentest-tools.com/api/v2/public/finding_templates \
--header 'Authorization: Bearer <token>'{
"data": [
{
"name": "OS Command Injection",
"software_type": "Web Server",
"vendor": "Microsoft",
"product": "Laravel",
"date": "2020-12-25T00:00:00.000Z",
"codename": "OMIGOD",
"vuln_description": "We found that the target F5 BIG-IP server is vulnerable to CVE-2020-5902, a Remote Code Execution vulnerability, affecting the Traffic Management User Interface (TMUI) component, which is publicly accessible.\\nThe root cause of this vulnerability consists in a broken parser logic in the Tomcat endpoint. This allows an unauthenticated malicious attacker to access any file stored on the server.\\nWe have detected this by sending a HTTP GET request to the tmui endpoint, containing the /etc/passwd file, and looking for the output of the file in the response.",
"how_to_reproduce": "<string>",
"public_vuln_description": "F5 BIG-IP server is affected by a Remote Code Execution vulnerability, located in the Traffic Management User Interface (TMUI) component, which is publicly accessible.\\nThe root cause of this vulnerability consists in a broken parser logic in the Tomcat endpoint.\\nThis allows an unauthenticated malicious attacker to access any file stored on the server or to execute arbitrary commands on the server.",
"risk_description": "The risk exists that a remote unauthenticated attacker can fully compromise the F5 BIG-IP server in order to steal confidential information, install ransomware or pivot to the internal network.",
"recommendation": "We recommend upgrading your F5 BIG-IP server to the latest version.",
"public_recommendation": "Upgrade F5 BIG-IP server to the latest version or to a non-vulnerable version listed in K52145254.",
"references": "<a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5902\" target=\"_blank\">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5902</a><br><a href=\"https://pentest-tools.com/blog/big-ip-tmui-rce/\" target=\"_blank\">https://pentest-tools.com/blog/big-ip-tmui-rce/</a><br><a href=\"https://www.ptsecurity.com/ww-en/about/news/f5-fixes-critical-vulnerability-discovered-by-positive-technologies-in-big-ip-application-delivery-controller/\" target=\"_blank\">https://www.ptsecurity.com/ww-en/about/news/f5-fixes-critical-vulnerability-discovered-by-positive-technologies-in-big-ip-application-delivery-controller/</a><br><a href=\"https://research.nccgroup.com/2020/07/12/understanding-the-root-cause-of-f5-networks-k52145254-tmui-rce-vulnerability-cve-2020-5902/\" target=\"_blank\">https://research.nccgroup.com/2020/07/12/understanding-the-root-cause-of-f5-networks-k52145254-tmui-rce-vulnerability-cve-2020-5902/</a>",
"vuln_cvssv3": 123,
"cve": [
"CVE-2021-26855",
"CVE-2021-27065"
],
"ptt_exploit_capabilities": [
"RCE",
"File Read"
],
"vuln_id": "NETSCAN-SNIPER-CVE-2021-42013-RCE",
"epss_score": 123,
"epss_percentile": 123,
"in_cisa_catalog": true,
"published": "2021-08-04T00:00:00.000Z",
"updated": "2022-05-25T00:00:00.000Z"
}
]
}Use the "API key" from the profile page as the token
The vuln_id type of the vulnerability (e.g. "NETSCAN", "WEBSCAN")
^[A-Z]{7}$"NETSCAN"
Only show vulnerabilities which have/don"t have exploit capabilities. Setting this to false will only show vulnerabilities without any capabilities.
true
the maximum number of templates to return
100
the offset to start returning templates from. This does not work without the limit parameter
100
OK
Show child attributes
Was this page helpful?
curl --request GET \
--url https://app.pentest-tools.com/api/v2/public/finding_templates \
--header 'Authorization: Bearer <token>'{
"data": [
{
"name": "OS Command Injection",
"software_type": "Web Server",
"vendor": "Microsoft",
"product": "Laravel",
"date": "2020-12-25T00:00:00.000Z",
"codename": "OMIGOD",
"vuln_description": "We found that the target F5 BIG-IP server is vulnerable to CVE-2020-5902, a Remote Code Execution vulnerability, affecting the Traffic Management User Interface (TMUI) component, which is publicly accessible.\\nThe root cause of this vulnerability consists in a broken parser logic in the Tomcat endpoint. This allows an unauthenticated malicious attacker to access any file stored on the server.\\nWe have detected this by sending a HTTP GET request to the tmui endpoint, containing the /etc/passwd file, and looking for the output of the file in the response.",
"how_to_reproduce": "<string>",
"public_vuln_description": "F5 BIG-IP server is affected by a Remote Code Execution vulnerability, located in the Traffic Management User Interface (TMUI) component, which is publicly accessible.\\nThe root cause of this vulnerability consists in a broken parser logic in the Tomcat endpoint.\\nThis allows an unauthenticated malicious attacker to access any file stored on the server or to execute arbitrary commands on the server.",
"risk_description": "The risk exists that a remote unauthenticated attacker can fully compromise the F5 BIG-IP server in order to steal confidential information, install ransomware or pivot to the internal network.",
"recommendation": "We recommend upgrading your F5 BIG-IP server to the latest version.",
"public_recommendation": "Upgrade F5 BIG-IP server to the latest version or to a non-vulnerable version listed in K52145254.",
"references": "<a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5902\" target=\"_blank\">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5902</a><br><a href=\"https://pentest-tools.com/blog/big-ip-tmui-rce/\" target=\"_blank\">https://pentest-tools.com/blog/big-ip-tmui-rce/</a><br><a href=\"https://www.ptsecurity.com/ww-en/about/news/f5-fixes-critical-vulnerability-discovered-by-positive-technologies-in-big-ip-application-delivery-controller/\" target=\"_blank\">https://www.ptsecurity.com/ww-en/about/news/f5-fixes-critical-vulnerability-discovered-by-positive-technologies-in-big-ip-application-delivery-controller/</a><br><a href=\"https://research.nccgroup.com/2020/07/12/understanding-the-root-cause-of-f5-networks-k52145254-tmui-rce-vulnerability-cve-2020-5902/\" target=\"_blank\">https://research.nccgroup.com/2020/07/12/understanding-the-root-cause-of-f5-networks-k52145254-tmui-rce-vulnerability-cve-2020-5902/</a>",
"vuln_cvssv3": 123,
"cve": [
"CVE-2021-26855",
"CVE-2021-27065"
],
"ptt_exploit_capabilities": [
"RCE",
"File Read"
],
"vuln_id": "NETSCAN-SNIPER-CVE-2021-42013-RCE",
"epss_score": 123,
"epss_percentile": 123,
"in_cisa_catalog": true,
"published": "2021-08-04T00:00:00.000Z",
"updated": "2022-05-25T00:00:00.000Z"
}
]
}