First published: Thu Apr 06 2017(Updated: )
F5 SSL Intercept iApp 1.5.0 - 1.5.7 and SSL Orchestrator 2.0 is vulnerable to a Server-Side Request Forgery (SSRF) attack when deployed using the Dynamic Domain Bypass (DDB) feature feature plus SNAT Auto Map option for egress traffic.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 SSL Intercept iApp | =1.5.0 | |
F5 SSL Intercept iApp | =1.5.7 | |
F5 BIG-IP SSL Orchestrator | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6130 has a high severity rating due to its potential for exploitation via a Server-Side Request Forgery (SSRF) attack.
To mitigate CVE-2017-6130, you should upgrade to the latest version of F5 SSL Intercept iApp or SSL Orchestrator that does not have this vulnerability.
CVE-2017-6130 affects F5 SSL Intercept iApp versions 1.5.0 to 1.5.7 and F5 BIG-IP SSL Orchestrator version 2.0.
Exploiting CVE-2017-6130 can allow an attacker to send unauthorized requests from the vulnerable server, potentially leading to data exposure.
While the best solution is to update the software, temporarily disabling the Dynamic Domain Bypass feature can reduce exposure to CVE-2017-6130.