First published: Tue Apr 12 2016(Updated: )
Incomplete blacklist vulnerability in the Configuration utility in F5 BIG-IP LTM, Analytics, APM, ASM, GTM, Link Controller, and PSM 11.x before 11.2.1 HF11, 11.3.x, 11.4.0 before HF8, and 11.4.1 before HF6; BIG-IP AAM 11.4.0 before HF8 and 11.4.1 before HF6; BIG-IP AFM and PEM 11.3.x, 11.4.0 before HF8, and 11.4.1 before HF6; and BIG-IP Edge Gateway, WebAccelerator, and WOM 11.x before 11.2.1 HF11 and 11.3.0 allows remote authenticated users to upload files via uploadImage.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Access Policy Manager | =11.0.0 | |
F5 Access Policy Manager | =11.1.0 | |
F5 Access Policy Manager | =11.2.0 | |
F5 Access Policy Manager | =11.2.1 | |
F5 Access Policy Manager | =11.3.0 | |
F5 Access Policy Manager | =11.4.0 | |
F5 Access Policy Manager | =11.4.1 | |
F5 BIG-IP Advanced Firewall Manager | =11.3.0 | |
F5 BIG-IP Advanced Firewall Manager | =11.4.0 | |
F5 BIG-IP Advanced Firewall Manager | =11.4.1 | |
F5 BIG-IP Analytics | =11.0.0 | |
F5 BIG-IP Analytics | =11.1.0 | |
F5 BIG-IP Analytics | =11.2.0 | |
F5 BIG-IP Analytics | =11.2.1 | |
F5 BIG-IP Analytics | =11.3.0 | |
F5 BIG-IP Analytics | =11.4.0 | |
F5 BIG-IP Analytics | =11.4.1 | |
F5 BIG-IP Application Acceleration Manager | =11.4.0 | |
F5 BIG-IP Application Acceleration Manager | =11.4.1 | |
F5 Application Security Manager | =11.0.0 | |
F5 Application Security Manager | =11.1.0 | |
F5 Application Security Manager | =11.2.0 | |
F5 Application Security Manager | =11.2.1 | |
F5 Application Security Manager | =11.3.0 | |
F5 Application Security Manager | =11.4.0 | |
F5 Application Security Manager | =11.4.1 | |
F5 BIG-IP Edge Gateway | =11.0.0 | |
F5 BIG-IP Edge Gateway | =11.1.0 | |
F5 BIG-IP Edge Gateway | =11.2.0 | |
F5 BIG-IP Edge Gateway | =11.2.1 | |
F5 BIG-IP Edge Gateway | =11.3.0 | |
Riverbed SteelApp Traffic Manager | =11.0.0 | |
Riverbed SteelApp Traffic Manager | =11.1.0 | |
Riverbed SteelApp Traffic Manager | =11.2.0 | |
Riverbed SteelApp Traffic Manager | =11.2.1 | |
Riverbed SteelApp Traffic Manager | =11.3.0 | |
Riverbed SteelApp Traffic Manager | =11.4.0 | |
F5 BIG-IP Link Controller | =11.0.0 | |
F5 BIG-IP Link Controller | =11.1.0 | |
F5 BIG-IP Link Controller | =11.2.0 | |
F5 BIG-IP Link Controller | =11.2.1 | |
F5 BIG-IP Link Controller | =11.3.0 | |
F5 BIG-IP Link Controller | =11.4.0 | |
F5 BIG-IP Link Controller | =11.4.1 | |
Riverbed SteelApp Traffic Manager | =11.0.0 | |
Riverbed SteelApp Traffic Manager | =11.1.0 | |
Riverbed SteelApp Traffic Manager | =11.2.0 | |
Riverbed SteelApp Traffic Manager | =11.2.1 | |
Riverbed SteelApp Traffic Manager | =11.3.0 | |
Riverbed SteelApp Traffic Manager | =11.4.0 | |
Riverbed SteelApp Traffic Manager | =11.4.1 | |
F5 BIG-IP Policy Enforcement Manager | =11.3.0 | |
F5 BIG-IP Policy Enforcement Manager | =11.4.0 | |
F5 BIG-IP Policy Enforcement Manager | =11.4.1 | |
F5 BIG-IP Protocol Security Manager | =11.0.0 | |
F5 BIG-IP Protocol Security Manager | =11.1.0 | |
F5 BIG-IP Protocol Security Manager | =11.2.0 | |
F5 BIG-IP Protocol Security Manager | =11.2.1 | |
F5 BIG-IP Protocol Security Manager | =11.3.0 | |
F5 BIG-IP Protocol Security Manager | =11.4.0 | |
F5 BIG-IP Protocol Security Manager | =11.4.1 | |
Exinda WAN Optimization Suite | =11.0.0 | |
Exinda WAN Optimization Suite | =11.1.0 | |
Exinda WAN Optimization Suite | =11.2.0 | |
Exinda WAN Optimization Suite | =11.2.1 | |
Exinda WAN Optimization Suite | =11.3.0 | |
F5 BIG-IP WebAccelerator | =11.0.0 | |
F5 BIG-IP WebAccelerator | =11.1.0 | |
F5 BIG-IP WebAccelerator | =11.2.0 | |
F5 BIG-IP WebAccelerator | =11.2.1 | |
F5 BIG-IP WebAccelerator | =11.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8021 has a medium severity rating indicating a potential risk of exploitation.
To mitigate the effects of CVE-2015-8021, it is recommended to update to the patched versions provided by F5.
CVE-2015-8021 affects various versions of F5 BIG-IP including LTM, APM, ASM, GTM, and others prior to specific HF releases.
Yes, CVE-2015-8021 can potentially allow unauthorized access due to incomplete input validation.
Implementing proper configurations and access controls may help mitigate some risks associated with CVE-2015-8021.