Lucene search

K
f5F5F5:K8599
HistoryMar 19, 2013 - 12:00 a.m.

K8599 : XSS vulnerability viewing logs from the Console section of the web management interface

2013-03-1900:00:00
my.f5.com
7

5.7 Medium

AI Score

Confidence

High

0.023 Low

EPSS

Percentile

89.7%

Security Advisory Description

Note: Versions that are not listed in this article have not been evaluated for vulnerability to this security advisory. For information about the F5 security policy regarding evaluating older and unsupported versions of F5 products, refer to K4602: Overview of the F5 security vulnerability response policy.

F5 products and versions that have been evaluated for this Security Advisory

Product Affected Not Affected
BIG-IP LTM 9.0.0 - 9.2.5
9.3.0 - 9.3.1
9.4.0 - 9.4.8
9.6.0 - 9.6.1 10.x
11.x
BIG-IP GTM 9.2.2 - 9.2.5
9.3.0 - 9.3.1
9.4.0 - 9.4.8 10.x
11.x
BIG-IP ASM 9.2.0 - 9.2.5
9.3.0 - 9.3.1
9.4.0 - 9.4.8 10.x
11.x
BIG-IP Link Controller 9.2.2 - 9.2.5
9.3.0 - 9.3.1
9.4.0 - 9.4.8 10.x
11.x
BIG-IP WebAccelerator 9.4.0 - 9.4.8 10.x
11.x
BIG-IP PSM 9.4.5 - 9.4.8 10.x
11.x
BIG-IP WAN Optimization None 10.x
11.x
BIG-IP APM None 10.x
11.x
BIG-IP Edge Gateway None 10.x
11.x
BIG-IP Analytics None 11.x
BIG-IP AFM None 11.x
BIG-IP PEM None 11.x
FirePass None 3.x
4.x
5.x
6.x
7.x
Enterprise Manager 1.0.0 - 1.7.0 1.8.0
2.x
3.x
ARX None 2.x
3.x
4.x
5.x
6.x

A cross-site scripting (XSS) vulnerability in the Console feature of the BIG-IP and Enterprise Manager web management interface may allow for script execution when viewing a log file that contains malicious content. Exploitation of this vulnerability would require an attacker to generate a log entry that contains an embedded script. The embedded script could then be executed if an authenticated web management interface user viewed the log file using the Console feature.

To prevent exposure to this vulnerability do not view log files using the Console feature of the BIG-IP or Enterprise Manager web management interface. To view log files from the command line, access the device using an SSH client.

Note: Because exploitation of this vulnerability requires an authenticated user, F5 considers this to be a local vulnerability.

F5 Product Development tracked this issue as CR96889, and it was fixed in BIG-IP 10.0.0 and Enterprise Manger 1.8.0. For information about upgrading, refer to the BIG-IP LTM, GTM, ASM, PSM, Link Controller, WebAccelerator or Enterprise Manager release notes.

Information about this advisory is available at the following locations:

5.7 Medium

AI Score

Confidence

High

0.023 Low

EPSS

Percentile

89.7%