A directory traversal vulnerability exists in an undisclosed page of the BIG-IP Configuration utility which may allow an authenticated attacker to read files with .xml extension. Access to restricted information is limited and the attacker does not control what information is obtained.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Link | Resource |
---|---|
https://my.f5.com/manage/s/article/K000132768 | Vendor Advisory |
https://my.f5.com/manage/s/article/K000132768 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://my.f5.com/manage/s/article/K000132768 - Vendor Advisory |
05 Oct 2023, 15:52
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
10 May 2023, 18:44
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:* |
|
First Time |
F5 big-ip Edge Gateway
F5 big-ip Policy Enforcement Manager F5 big-ip Global Traffic Manager F5 big-ip Ddos Hybrid Defender F5 big-ip Local Traffic Manager F5 big-ip Application Security Manager F5 big-ip Domain Name System F5 big-ip Access Policy Manager F5 F5 big-ip Websafe F5 big-ip Application Acceleration Manager F5 big-ip Advanced Web Application Firewall F5 big-ip Application Visibility And Reporting F5 big-ip Ssl Orchestrator F5 big-ip Analytics F5 big-ip Carrier-grade Nat F5 big-ip Advanced Firewall Manager F5 big-ip Link Controller F5 big-ip Webaccelerator F5 big-ip Fraud Protection Service |
|
References | (MISC) https://my.f5.com/manage/s/article/K000132768 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
03 May 2023, 15:23
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-03 15:15
Updated : 2024-11-21 07:55
NVD link : CVE-2023-28406
Mitre link : CVE-2023-28406
CVE.ORG link : CVE-2023-28406
JSON object : View
Products Affected
f5
- big-ip_advanced_web_application_firewall
- big-ip_access_policy_manager
- big-ip_fraud_protection_service
- big-ip_analytics
- big-ip_ddos_hybrid_defender
- big-ip_advanced_firewall_manager
- big-ip_websafe
- big-ip_local_traffic_manager
- big-ip_ssl_orchestrator
- big-ip_application_visibility_and_reporting
- big-ip_webaccelerator
- big-ip_carrier-grade_nat
- big-ip_edge_gateway
- big-ip_link_controller
- big-ip_domain_name_system
- big-ip_application_acceleration_manager
- big-ip_global_traffic_manager
- big-ip_application_security_manager
- big-ip_policy_enforcement_manager
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')