On F5 BIG-IP 13.1.0-13.1.0.3 or 13.0.0, when authenticated administrative users execute commands in the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, restrictions on allowed commands may not be enforced.
                
            References
                    | Link | Resource | 
|---|---|
| http://packetstormsecurity.com/files/152213/VMware-Host-VMX-Process-Impersonation-Hijack-Privilege-Escalation.html | Third Party Advisory VDB Entry | 
| https://support.f5.com/csp/article/K30500703 | Vendor Advisory | 
| https://www.exploit-db.com/exploits/46600/ | Exploit Third Party Advisory VDB Entry | 
| http://packetstormsecurity.com/files/152213/VMware-Host-VMX-Process-Impersonation-Hijack-Privilege-Escalation.html | Third Party Advisory VDB Entry | 
| https://support.f5.com/csp/article/K30500703 | Vendor Advisory | 
| https://www.exploit-db.com/exploits/46600/ | Exploit Third Party Advisory VDB Entry | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
Configuration 2 (hide)
            
            
  | 
    
Configuration 3 (hide)
            
            
  | 
    
Configuration 4 (hide)
            
            
  | 
    
Configuration 5 (hide)
            
            
  | 
    
Configuration 6 (hide)
            
            
  | 
    
Configuration 7 (hide)
            
            
  | 
    
Configuration 8 (hide)
            
            
  | 
    
Configuration 9 (hide)
            
            
  | 
    
Configuration 10 (hide)
            
            
  | 
    
Configuration 11 (hide)
            
            
  | 
    
Configuration 12 (hide)
            
            
  | 
    
Configuration 13 (hide)
            
            
  | 
    
Configuration 14 (hide)
            
            
  | 
    
Configuration 15 (hide)
| AND | 
            
            
 
  | 
    
Configuration 16 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 04:08
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://packetstormsecurity.com/files/152213/VMware-Host-VMX-Process-Impersonation-Hijack-Privilege-Escalation.html - Third Party Advisory, VDB Entry | |
| References | () https://support.f5.com/csp/article/K30500703 - Vendor Advisory | |
| References | () https://www.exploit-db.com/exploits/46600/ - Exploit, Third Party Advisory, VDB Entry | 
Information
                Published : 2018-04-13 13:29
Updated : 2024-11-21 04:08
NVD link : CVE-2018-5511
Mitre link : CVE-2018-5511
CVE.ORG link : CVE-2018-5511
JSON object : View
Products Affected
                f5
- big-ip_local_traffic_manager
 - big-ip_application_security_manager
 - big-ip_websafe
 - big-ip_domain_name_system
 - big-ip_edge_gateway
 - big-ip_policy_enforcement_manager
 - big-ip_application_acceleration_manager
 - big-ip_global_traffic_manager
 - big-ip_advanced_firewall_manager
 - big-ip_analytics
 - big-ip_access_policy_manager
 - big-ip_enterprise_manager
 - big-ip_link_controller
 - big-ip_webaccelerator
 
microsoft
- windows_10
 
vmware
- workstation
 - workstation_player
 
CWE
                
                    
                        
                        CWE-470
                        
            Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
