Lucene search

K
f5F5SOL23073482
HistoryMay 11, 2016 - 12:00 a.m.

SOL23073482 - Nginx vulnerabilities CVE-2016-0742, CVE-2016-0746, and CVE-2016-0747

2016-05-1100:00:00
support.f5.com
38

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.871 High

EPSS

Percentile

98.3%

Vulnerability Recommended Actions

If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in theVersions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.

F5 responds to vulnerabilities in accordance with the Severity values published in the previous table. TheSeverity values and other security vulnerability parameters are defined in SOL4602: Overview of the F5 security vulnerability response policy.

Removing the outbound reverse SSL proxy configuration in the webd or nginx configuration

To mitigate this vulnerability, you can remove the outbound reverse SSL proxy configuration in the nginx orwebd configuration file. To do so, perform one of the following procedures, depending on the affected BIG-IQ version:

Impact of action: This procedure involves restartingwebdornginx daemon, which will cause the BIG-IQ user interface to be inaccessible. F5 recommends to perform this procedure during a scheduled maintenance window.

BIG-IQ Centralized Management 4.6.0, BIG-IQ Cloud and Orchestration 1.0.0, and BIG-IQ 4.4.0 through 4.5.0

The webdconfiguration file is located at /etc/webd/webd.conf. To remove the outbound reverse SSL proxy configuration in thewebd configuration file, perform the following procedure:

  1. Log in to the BIG-IQ system’s advance shell using administrator role credentials.
  2. Stop the webd process by typing the following command:

tmsh stop sys service webd

  1. Back up a copy of the webd configuration file using the following command syntax:

cp -a /etc/webd/webd.conf /etc/webd/webd.conf.backup

  1. Using a text editor of your choice, modify the webd configuration file.
  2. Locate the outbound reverse SSL proxy configuration stanza that may appear similar to the following example:

Outbound http to https proxy

Used by the REST framework’s HTTPD signing endpoint

server {
listen 127.0.0.1:80;
location ~ /proxy/(.+) {
resolver 8.8.8.8;
proxy_pass https://$1$is_args$args;
}
}

  1. Remove the outbound reverse SSL proxy configuration stanza, save the changes, and exit the text editor.
  2. Start the webd process by typing the following command:

tmsh start sys service webd

BIG-IQ 4.3.0

The nginx configuration file is located at**/etc/nginx/nginx.conf**. To remove the outbound reverse SSL proxy configuration in thenginx configuration file, perform the following procedure:

  1. Log in to the BIG-IQ system’s advance shell using administrator role credentials.
  2. Stop the nginx process by typing the following command:

tmsh stop sys service nginx

  1. Back up a copy of the nginx configuration file using the following command syntax:

cp -a /etc/webd/nginx.conf /etc/webd/nginx.conf.backup

  1. Using a text editor of your choice, modify the nginx configuration file.
  2. Locate the outbound reverse SSL proxy configuration stanza that may appear similar to the following example:

Outbound http to https proxy

Used by the REST framework’s HTTPD signing endpoint

server {
listen 127.0.0.1:80;
location ~ /proxy/(.+) {
resolver 8.8.8.8;
proxy_pass https://$1$is_args$args;
}
}

  1. Remove the outbound reverse SSL proxy configuration stanza, save the changes, and exit the text editor.
  2. Start the nginx process by typing the following command:

tmsh start sys service nginx

Supplemental Information

  • SOL9970: Subscribing to email notifications regarding F5 products
  • SOL9957: Creating a custom RSS feed to view new and updated documents
  • SOL4602: Overview of the F5 security vulnerability response policy
  • SOL4918: Overview of the F5 critical issue hotfix policy
  • SOL167: Downloading software and firmware from F5
  • SOL15106: Managing BIG-IQ product hotfixes
  • SOL15113: BIG-IQ hotfix matrix
  • SOL14736: BIG-IQ daemons

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.871 High

EPSS

Percentile

98.3%