Note: Versions that are not listed in this article have not been evaluated for vulnerability to this security advisory. For information about the F5 security policy regarding evaluating older and unsupported versions of F5 products, refer to K4602: Overview of the F5 security vulnerability response policy.
F5 products and versions that have been evaluated for this Security Advisory
Product | Affected | Not Affected |
---|---|---|
BIG-IP LTM | 9.0.0 - 9.2.5 | |
9.3.0 - 9.3.1 | ||
9.4.0 - 9.4.8 | ||
9.6.0 - 9.6.1 | 10.x | |
11.x | ||
BIG-IP GTM | 9.2.2 - 9.2.5 | |
9.3.0 - 9.3.1 | ||
9.4.0 - 9.4.8 | 10.x | |
11.x | ||
BIG-IP ASM | 9.2.0 - 9.2.5 | |
9.3.0 - 9.3.1 | ||
9.4.0 - 9.4.8 | 10.x | |
11.x | ||
BIG-IP Link Controller | 9.2.2 - 9.2.5 | |
9.3.0 - 9.3.1 | ||
9.4.0 - 9.4.8 | 10.x | |
11.x | ||
BIG-IP WebAccelerator | 9.4.0 - 9.4.8 | 10.x |
11.x | ||
BIG-IP PSM | 9.4.5 - 9.4.8 | 10.x |
11.x | ||
BIG-IP WAN Optimization | None | 10.x |
11.x | ||
BIG-IP APM | None | 10.x |
11.x | ||
BIG-IP Edge Gateway | None | 10.x |
11.x | ||
BIG-IP Analytics | None | 11.x |
BIG-IP AFM | None | 11.x |
BIG-IP PEM | None | 11.x |
FirePass | None | 3.x |
4.x | ||
5.x | ||
6.x | ||
7.x | ||
Enterprise Manager | 1.0.0 - 1.7.0 | 1.8.0 |
2.x | ||
3.x | ||
ARX | None | 2.x |
3.x | ||
4.x | ||
5.x | ||
6.x |
A cross-site scripting (XSS) vulnerability in the Console feature of the BIG-IP and Enterprise Manager web management interface may allow for script execution when viewing a log file that contains malicious content. Exploitation of this vulnerability would require an attacker to generate a log entry that contains an embedded script. The embedded script could then be executed if an authenticated web management interface user viewed the log file using the Console feature.
To prevent exposure to this vulnerability do not view log files using the Console feature of the BIG-IP or Enterprise Manager web management interface. To view log files from the command line, access the device using an SSH client.
Note: Because exploitation of this vulnerability requires an authenticated user, F5 considers this to be a local vulnerability.
F5 Product Development tracked this issue as CR96889, and it was fixed in BIG-IP 10.0.0 and Enterprise Manger 1.8.0. For information about upgrading, refer to the BIG-IP LTM, GTM, ASM, PSM, Link Controller, WebAccelerator or Enterprise Manager release notes.
Information about this advisory is available at the following locations: