Lucene search

K
openvasCopyright (C) 2016 Greenbone AGOPENVAS:1361412562310105868
HistoryAug 12, 2016 - 12:00 a.m.

F5 BIG-IP - BIG-IP APM access logs vulnerability CVE-2016-1497

2016-08-1200:00:00
Copyright (C) 2016 Greenbone AG
plugins.openvas.org
9

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

5.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.9%

A vulnerability in the BIG-IP Configuration utility can be used by an unauthorized BIG-IP administrative user to gain unauthorized access to the Access Policy Manager (APM)
access logs. This vulnerability requires valid user account credentials and access to the Configuration utility. This flaw exists when APM is configured, and exposes session details within the access logs. If
the BIG-IP APM system is not in use, the vulnerability still exists. However, there is no data stored in the log files in question when the BIG-IP APM system is not actively in use.

# SPDX-FileCopyrightText: 2016 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/h:f5:big-ip";

if (description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.105868");
  script_cve_id("CVE-2016-1497");
  script_tag(name:"cvss_base", value:"4.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:P/I:N/A:N");
  script_version("2024-05-29T05:05:18+0000");

  script_name("F5 BIG-IP - BIG-IP APM access logs vulnerability CVE-2016-1497");

  script_xref(name:"URL", value:"https://my.f5.com/manage/s/article/K31925518");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"solution", value:"See the referenced vendor advisory for a solution.");

  script_tag(name:"summary", value:"A vulnerability in the BIG-IP Configuration utility can be used by an unauthorized BIG-IP administrative user to gain unauthorized access to the Access Policy Manager (APM)
access logs. This vulnerability requires valid user account credentials and access to the Configuration utility. This flaw exists when APM is configured, and exposes session details within the access logs. If
the BIG-IP APM system is not in use, the vulnerability still exists. However, there is no data stored in the log files in question when the BIG-IP APM system is not actively in use.");

  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");

  script_tag(name:"last_modification", value:"2024-05-29 05:05:18 +0000 (Wed, 29 May 2024)");
  script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2019-06-06 15:11:00 +0000 (Thu, 06 Jun 2019)");
  script_tag(name:"creation_date", value:"2016-08-12 13:37:02 +0200 (Fri, 12 Aug 2016)");
  script_category(ACT_GATHER_INFO);
  script_family("F5 Local Security Checks");
  script_copyright("Copyright (C) 2016 Greenbone AG");
  script_dependencies("gb_f5_big_ip_ssh_login_detect.nasl");
  script_mandatory_keys("f5/big_ip/version", "f5/big_ip/active_modules");
  exit(0);
}

include("f5.inc");
include("host_details.inc");
include("list_array_func.inc");
include("version_func.inc");

if (!version = get_app_version(cpe: CPE, service: "ssh-login"))
  exit(0);

check_f5["LTM"] = make_array("affected",   "12.0.0;11.0.0-11.6.0;",
                             "unaffected", "12.1.0-12.1.1;12.0.0_HF1;11.6.1;11.5.4_HF2;11.4.1_HF10;11.2.1_HF16;10.1.0-10.2.4;");

check_f5["AAM"] = make_array("affected",   "12.0.0;11.0.0-11.6.0;",
                             "unaffected", "12.1.0-12.1.1;12.0.0_HF1;11.6.1;11.5.4_HF2;11.4.1_HF10;11.2.1_HF16;10.1.0-10.2.4;");

check_f5["AFM"] = make_array("affected",   "12.0.0;11.0.0-11.6.0;",
                             "unaffected", "12.1.0-12.1.1;12.0.0_HF1;11.6.1;11.5.4_HF2;11.4.1_HF10;11.2.1_HF16;10.1.0-10.2.4;");

check_f5["AVR"] = make_array("affected",   "12.0.0;11.0.0-11.6.0;",
                             "unaffected", "12.1.0-12.1.1;12.0.0_HF1;11.6.1;11.5.4_HF2;11.4.1_HF10;11.2.1_HF16;10.1.0-10.2.4;");

check_f5["APM"] = make_array("affected",   "12.0.0;11.0.0-11.6.0;",
                             "unaffected", "12.1.0-12.1.1;12.0.0_HF1;11.6.1;11.5.4_HF2;11.4.1_HF10;11.2.1_HF16;10.1.0-10.2.4;");

check_f5["ASM"] = make_array("affected",   "12.0.0;11.0.0-11.6.0;",
                             "unaffected", "12.1.0-12.1.1;12.0.0_HF1;11.6.1;11.5.4_HF2;11.4.1_HF10;11.2.1_HF16;10.1.0-10.2.4;");

check_f5["GTM"] = make_array("affected",   "11.0.0-11.6.0;",
                             "unaffected", "11.6.1;11.5.4_HF2;11.4.1_HF10;11.2.1_HF16;10.1.0-10.2.4;");

check_f5["LC"]  = make_array("affected",   "12.0.0;11.0.0-11.6.0;",
                             "unaffected", "12.1.0-12.1.1;12.0.0_HF1;11.6.1;11.5.4_HF2;11.4.1_HF10;11.2.1_HF16;10.1.0-10.2.4;");

check_f5["PEM"] = make_array("affected",   "12.0.0;11.0.0-11.6.0;",
                             "unaffected", "12.1.0-12.1.1;12.0.0_HF1;11.6.1;11.5.4_HF2;11.4.1_HF10;11.2.1_HF16;10.1.0-10.2.4;");

check_f5["PSM"] = make_array("affected",   "11.0.0-11.4.1;",
                             "unaffected", "11.4.1_HF10;11.2.1_HF16;10.1.0-10.2.4;");

check_f5["WAM"] = make_array("affected",   "11.0.0-11.3.0;",
                             "unaffected", "11.2.1_HF16;10.1.0-10.2.4;");

check_f5["WOM"] = make_array("affected",   "11.0.0-11.3.0;",
                             "unaffected", "11.2.1_HF16;10.1.0-10.2.4;");

if (report = f5_is_vulnerable(ca: check_f5, version: version)) {
  security_message(port: 0, data: report);
  exit(0);
}

exit(99);

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

5.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.9%

Related for OPENVAS:1361412562310105868