Lucene search

K
f5F5F5:K8602
HistoryMar 19, 2013 - 12:00 a.m.

K8602 : XSS vulnerability viewing logs from the web management interface

2013-03-1900:00:00
my.f5.com
8

5.7 Medium

AI Score

Confidence

High

0.023 Low

EPSS

Percentile

89.7%

Security Advisory Description

Note: Versions that are not listed in this article have not been evaluated for vulnerability to this security advisory. For information about the F5 security policy regarding evaluating older and unsupported versions of F5 products, refer to K4602: Overview of the F5 security vulnerability response policy.

F5 products and versions that have been evaluated for this Security Advisory

Product Affected Not Affected
BIG-IP LTM 9.0.0 - 9.2.5
9.3.0 - 9.3.1
9.4.0 - 9.4.8
9.6.0 - 9.6.1 10.x
11.x
BIG-IP GTM 9.2.2 - 9.2.5
9.3.0 - 9.3.1
9.4.0 - 9.4.8 10.x
11.x
BIG-IP ASM 9.2.0 - 9.2.5
9.3.0 - 9.3.1
9.4.0 - 9.4.8 10.x
11.x
BIG-IP Link Controller 9.2.2 - 9.2.5
9.3.0 - 9.3.1
9.4.0 - 9.4.8 10.x
11.x
BIG-IP WebAccelerator 9.4.0 - 9.4.8 10.x
11.x
BIG-IP PSM 9.4.5 - 9.4.8 10.x
11.x
BIG-IP WAN Optimization None 10.x
11.x
BIG-IP APM None 10.x
11.x
BIG-IP Edge Gateway None 10.x
11.x
BIG-IP Analytics None 11.x
BIG-IP AFM None 11.x
BIG-IP PEM None 11.x
FirePass None 3.x
4.x
5.x
6.x
7.x
Enterprise Manager 1.0.0 - 1.7.0 1.8.0
2.x
3.x
ARX None 2.x
3.x
4.x
5.x
6.x

A cross-site scripting (XSS) vulnerability in the Logs section of the BIG-IP and Enterprise Manager web management interface may allow for script execution when viewing a log file that contains malicious content. Exploitation of this vulnerability would require an attacker to generate a log entry that contains an embedded link. The embedded link could then be executed if an authenticated web management interface user selected the link while viewing the log file using the web management interface.

To prevent exposure to this vulnerability do not select any unknown or suspicious content when viewing log files using the BIG-IP or Enterprise Manager web management interface. To view log files from the command line, access the device using an SSH client.

Note: Because exploitation of this vulnerability requires an authenticated user, F5 considers this to be a local vulnerability.

F5 Product Development tracked this issue as CR96889, and it was fixed in BIG-IP 10.0.0 and Enterprise Manager 1.8.0. For information about upgrading, refer to the BIG-IP LTM, GTM, ASM, PSM, Link Controller, WebAccelerator or Enterprise Manager release notes.

For additional information about this advisory, refer to the following articles:

5.7 Medium

AI Score

Confidence

High

0.023 Low

EPSS

Percentile

89.7%