/cve-2022-1388-1veresk

Simple shell script for the exploit

Primary LanguageShellMIT LicenseMIT

CVE-2022-1388 by 1vere$k

CVE-2022-1388 the proof-of-concept.
Two regimes of work with:

  • simple target URL, default PORT will be set as 80 if it wasn't mentioned;
  • file with list of targets <IP>:<PORT> \n\r;

Usage

	echo "+-------------------For-The-Help-------------------------------------+";
	echo "Example#1: ./cve-2022-1388.sh -h ------------------------------------+";
	echo "Example#2: ./cve-2022-1388.sh --help --------------------------------+";
	echo "+-------------------For-The-URL-Check -------------------------------+";
	echo "Example#1: ./cve-2022-1388.sh -u <IP> <PORT> [Default port will be 80]";
	echo "+-------------------For-The-File-Check-------------------------------+";
	echo "Example#1: ./cve-2022-1388.sh -f <FILENAME>--------------------------+";
	echo "+--------------------------------------------------------------------+";

Shodan Query

http.title:"BIG-IP&reg;-+Redirect" +"Server"

Contact

You are free to contact me via Keybase for any details.