POC详情: 64bb117243e471f6983495b65324847030af408f

来源
关联漏洞
标题: 多款F5 BIG-IP产品virtual server 信息泄露漏洞 (CVE-2016-9244)
描述:F5 BIG-IP Analytics等都是美国F5公司的产品。F5 BIG-IP Analytics是一套Web应用程序性能分析软件。APM是一套提供安全统一访问关键业务应用和网络的解决方案。LTM是一款本地流量管理器。virtual server是其中的一个通用配置组件。 多款F5 BIG-IP产品中的virtual server存在安全漏洞。远程攻击者可利用该漏洞从其他会话中获取Secure Sockets Layer (SSL)会话ID。以下产品和版本受到影响:F5 BIG-IP LTM 12.0
描述
This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.
介绍
# Ticketbleed [![License](https://img.shields.io/github/license/mashape/apistatus.svg?maxAge=2592000)](https://raw.githubusercontent.com/EgeBalci/Ticketbleed/master/LICENSE) [![CVE](https://img.shields.io/badge/CVE-2016--9244-red.svg)](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9244)

![](http://i.imgur.com/B9XEkvA.png)

This tool is for exploiting Ticketbleed (CVE-2016-9244) vulnerability, the Ticketbleed library inside src folder is a modified version of go's crypto/tls, it has few changes inside `handshake_client.go, tls.go, common.go` files but it is almost same. 

# BUILD

		cd Ticketbleed
        mv Ticketbleed.go.tmp Ticketbleed.go
		go get github.com/EgeBalci/Ticketbleed
		go build Ticketbleed.go


# USAGE

		    ./Ticketbleed <ip:port> <options> 
		OPTIONS:
		    -o, --out   Output filename for raw memory
		    -s, --size  Size in bytes to read (Output value may vary)
		    -h, --help  Print this message



# About CVE-2016-9244

Ticketbleed (CVE-2016-9244) is a software vulnerability in the TLS stack of certain F5 products that allows a remote attacker to extract up to 31 bytes of uninitialized memory at a time, which can contain any kind of random sensitive information, like in Heartbleed.

Founder: Filippo Valsorda

Finding Ticketbleed: https://blog.filippo.io/finding-ticketbleed/


VULNERABLE VERSIONS:

<table>
    <tr>
        <th>Product</th>
        <th>Version</th>
    </tr>
    <tr>
        <td>BIG-IP LTM</td>
        <td>12.0.0 - 12.1.2 & 11.4.0 - 11.6.1</td>
    </tr>
    <tr>
        <td>BIG-IP AAM</td>
        <td>12.0.0 - 12.1.2 & 11.4.0 - 11.6.1</td>
    </tr>
    <tr>
        <td>BIG-IP AFM</td>
        <td>12.0.0 - 12.1.2 & 11.4.0 - 11.6.1</td>
    </tr>
    <tr>
        <td>BIG-IP Analytics</td>
        <td>12.0.0 - 12.1.2 & 11.4.0 - 11.6.1</td>
    </tr>
    <tr>
        <td>BIG-IP APM</td>
        <td>12.0.0 - 12.1.2 & 11.4.0 - 11.6.1</td>
    </tr>
    <tr>
        <td>BIG-IP ASM</td>
        <td>12.0.0 - 12.1.2 & 11.4.0 - 11.6.1</td>
    </tr>
    <tr>
        <td>BIG-IP GTM</td>
        <td>11.4.0 - 11.6.1</td>
    </tr>
    <tr>
        <td>BIG-IP Link Controller</td>
        <td>12.0.0 - 12.1.2</td>
    </tr>
    <tr>
        <td>BIG-IP PEM</td>
        <td>12.0.0 - 12.1.2 & 11.4.0 - 11.6.1</td>
    </tr>
    <tr>
        <td>BIG-IP PSM</td>
        <td>11.4.0 - 11.4.1</td>
    </tr>
</table>
文件快照

[4.0K] /data/pocs/64bb117243e471f6983495b65324847030af408f ├── [2.6K] alert.go ├── [ 10K] cipher_suites.go ├── [ 22K] common.go ├── [ 30K] conn.go ├── [5.5K] conn_test.go ├── [2.2K] example_test.go ├── [4.3K] generate_cert.go ├── [ 19K] handshake_client.go ├── [ 18K] handshake_client_test.go ├── [ 31K] handshake_messages.go ├── [6.5K] handshake_messages_test.go ├── [ 21K] handshake_server.go ├── [ 38K] handshake_server_test.go ├── [4.2K] handshake_test.go ├── [ 12K] key_agreement.go ├── [1.0K] LICENSE ├── [ 11K] prf.go ├── [5.3K] prf_test.go ├── [2.3K] README.md ├── [4.0K] testdata │   ├── [9.8K] Client-TLSv10-ClientCert-ECDSA-ECDSA │   ├── [9.1K] Client-TLSv10-ClientCert-ECDSA-RSA │   ├── [9.7K] Client-TLSv10-ClientCert-RSA-ECDSA │   ├── [9.0K] Client-TLSv10-ClientCert-RSA-RSA │   ├── [6.5K] Client-TLSv10-ECDHE-ECDSA-AES │   ├── [6.9K] Client-TLSv10-ECDHE-RSA-AES │   ├── [5.8K] Client-TLSv10-RSA-RC4 │   ├── [6.7K] Client-TLSv11-ECDHE-ECDSA-AES │   ├── [7.1K] Client-TLSv11-ECDHE-RSA-AES │   ├── [5.8K] Client-TLSv11-RSA-RC4 │   ├── [6.0K] Client-TLSv12-AES128-GCM-SHA256 │   ├── [6.0K] Client-TLSv12-AES256-GCM-SHA384 │   ├── [6.9K] Client-TLSv12-ALPN │   ├── [6.7K] Client-TLSv12-ALPN-NoMatch │   ├── [ 10K] Client-TLSv12-ClientCert-ECDSA-ECDSA │   ├── [9.2K] Client-TLSv12-ClientCert-ECDSA-RSA │   ├── [ 10K] Client-TLSv12-ClientCert-RSA-AES256-GCM-SHA384 │   ├── [ 10K] Client-TLSv12-ClientCert-RSA-ECDSA │   ├── [9.2K] Client-TLSv12-ClientCert-RSA-RSA │   ├── [6.7K] Client-TLSv12-ECDHE-ECDSA-AES │   ├── [6.3K] Client-TLSv12-ECDHE-ECDSA-AES256-GCM-SHA384 │   ├── [6.3K] Client-TLSv12-ECDHE-ECDSA-AES-GCM │   ├── [7.1K] Client-TLSv12-ECDHE-RSA-AES │   ├── [5.8K] Client-TLSv12-RSA-RC4 │   ├── [8.4K] Client-TLSv12-SCT │   ├── [5.8K] Server-SSLv3-RSA-3DES │   ├── [5.9K] Server-SSLv3-RSA-AES │   ├── [5.5K] Server-SSLv3-RSA-RC4 │   ├── [6.2K] Server-TLSv10-ECDHE-ECDSA-AES │   ├── [5.5K] Server-TLSv10-RSA-3DES │   ├── [5.7K] Server-TLSv10-RSA-AES │   ├── [5.3K] Server-TLSv10-RSA-RC4 │   ├── [1.2K] Server-TLSv11-FallbackSCSV │   ├── [5.3K] Server-TLSv11-RSA-RC4 │   ├── [8.2K] Server-TLSv12-ALPN │   ├── [8.1K] Server-TLSv12-ALPN-NoMatch │   ├── [7.3K] Server-TLSv12-CipherSuiteCertPreferenceECDSA │   ├── [7.8K] Server-TLSv12-CipherSuiteCertPreferenceRSA │   ├── [8.8K] Server-TLSv12-ClientAuthRequestedAndECDSAGiven │   ├── [8.7K] Server-TLSv12-ClientAuthRequestedAndGiven │   ├── [5.6K] Server-TLSv12-ClientAuthRequestedNotGiven │   ├── [6.5K] Server-TLSv12-ECDHE-ECDSA-AES │   ├── [6.2K] Server-TLSv12-IssueTicket │   ├── [6.2K] Server-TLSv12-IssueTicketPreDisable │   ├── [2.6K] Server-TLSv12-Resume │   ├── [6.2K] Server-TLSv12-ResumeDisabled │   ├── [5.7K] Server-TLSv12-RSA-3DES │   ├── [6.0K] Server-TLSv12-RSA-AES │   ├── [6.4K] Server-TLSv12-RSA-AES256-GCM-SHA384 │   ├── [6.4K] Server-TLSv12-RSA-AES-GCM │   ├── [5.4K] Server-TLSv12-RSA-RC4 │   ├── [4.7K] Server-TLSv12-SNI │   ├── [4.7K] Server-TLSv12-SNI-GetCertificate │   └── [4.7K] Server-TLSv12-SNI-GetCertificateNotFound ├── [2.8M] Ticketbleed ├── [4.5K] Ticketbleed.go.tmp ├── [4.7K] ticket.go ├── [ 11K] tls.go └── [ 13K] tls_test.go 1 directory, 78 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。