First published: Mon Mar 11 2019(Updated: )
In BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.1.3, 12.1.0-12.1.3.7, 11.6.1-11.6.3.2, or 11.5.1-11.5.8, when remote authentication is enabled for administrative users and all external users are granted the "guest" role, unsanitized values can be reflected to the client via the login page. This can lead to a cross-site scripting attack against unauthenticated clients.
Credit: f5sirt@f5.com f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Big-ip Local Traffic Manager | >=11.5.1<=11.5.8 | |
F5 Big-ip Local Traffic Manager | >=11.6.1<=11.6.3.2 | |
F5 Big-ip Local Traffic Manager | >=12.1.0<=12.1.3.7 | |
F5 Big-ip Local Traffic Manager | >=13.0.0<=13.1.1.3 | |
F5 Big-ip Local Traffic Manager | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Application Acceleration Manager | >=11.5.1<=11.5.8 | |
F5 Big-ip Application Acceleration Manager | >=11.6.1<=11.6.3.2 | |
F5 Big-ip Application Acceleration Manager | >=12.1.0<=12.1.3.7 | |
F5 Big-ip Application Acceleration Manager | >=13.0.0<=13.1.1.3 | |
F5 Big-ip Application Acceleration Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Advanced Firewall Manager | >=11.5.1<=11.5.8 | |
F5 BIG-IP Advanced Firewall Manager | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<=12.1.3.7 | |
F5 BIG-IP Advanced Firewall Manager | >=13.0.0<=13.1.1.3 | |
F5 BIG-IP Advanced Firewall Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Analytics | >=11.5.1<=11.5.8 | |
F5 BIG-IP Analytics | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP Analytics | >=12.1.0<=12.1.3.7 | |
F5 BIG-IP Analytics | >=13.0.0<=13.1.1.3 | |
F5 BIG-IP Analytics | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Access Policy Manager | >=11.5.1<=11.5.8 | |
F5 BIG-IP Access Policy Manager | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP Access Policy Manager | >=12.1.0<=12.1.3.7 | |
F5 BIG-IP Access Policy Manager | >=13.0.0<=13.1.1.3 | |
F5 BIG-IP Access Policy Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Application Security Manager | >=11.5.1<=11.5.8 | |
F5 BIG-IP Application Security Manager | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP Application Security Manager | >=12.1.0<=12.1.3.7 | |
F5 BIG-IP Application Security Manager | >=13.0.0<=13.1.1.3 | |
F5 BIG-IP Application Security Manager | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Domain Name System | >=11.5.1<=11.5.8 | |
F5 Big-ip Domain Name System | >=11.6.1<=11.6.3.2 | |
F5 Big-ip Domain Name System | >=12.1.0<=12.1.3.7 | |
F5 Big-ip Domain Name System | >=13.0.0<=13.1.1.3 | |
F5 Big-ip Domain Name System | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Edge Gateway | >=11.5.1<=11.5.8 | |
F5 Big-ip Edge Gateway | >=11.6.1<=11.6.3.2 | |
F5 Big-ip Edge Gateway | >=12.1.0<=12.1.3.7 | |
F5 Big-ip Edge Gateway | >=13.0.0<=13.1.1.3 | |
F5 Big-ip Edge Gateway | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Fraud Protection Service | >=11.5.1<=11.5.8 | |
F5 Big-ip Fraud Protection Service | >=11.6.1<=11.6.3.2 | |
F5 Big-ip Fraud Protection Service | >=12.1.0<=12.1.3.7 | |
F5 Big-ip Fraud Protection Service | >=13.0.0<=13.1.1.3 | |
F5 Big-ip Fraud Protection Service | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Global Traffic Manager | >=11.5.1<=11.5.8 | |
F5 Big-ip Global Traffic Manager | >=11.6.1<=11.6.3.2 | |
F5 Big-ip Global Traffic Manager | >=12.1.0<=12.1.3.7 | |
F5 Big-ip Global Traffic Manager | >=13.0.0<=13.1.1.3 | |
F5 Big-ip Global Traffic Manager | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Link Controller | >=11.5.1<=11.5.8 | |
F5 Big-ip Link Controller | >=11.6.1<=11.6.3.2 | |
F5 Big-ip Link Controller | >=12.1.0<=12.1.3.7 | |
F5 Big-ip Link Controller | >=13.0.0<=13.1.1.3 | |
F5 Big-ip Link Controller | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Policy Enforcement Manager | >=11.5.1<=11.5.8 | |
F5 Big-ip Policy Enforcement Manager | >=11.6.1<=11.6.3.2 | |
F5 Big-ip Policy Enforcement Manager | >=12.1.0<=12.1.3.7 | |
F5 Big-ip Policy Enforcement Manager | >=13.0.0<=13.1.1.3 | |
F5 Big-ip Policy Enforcement Manager | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Webaccelerator | >=11.5.1<=11.5.8 | |
F5 Big-ip Webaccelerator | >=11.6.1<=11.6.3.2 | |
F5 Big-ip Webaccelerator | >=12.1.0<=12.1.3.7 | |
F5 Big-ip Webaccelerator | >=13.0.0<=13.1.1.3 | |
F5 Big-ip Webaccelerator | >=14.0.0<=14.0.0.2 | |
>=11.5.1<=11.5.8 | ||
>=11.6.1<=11.6.3.2 | ||
>=12.1.0<=12.1.3.7 | ||
>=13.0.0<=13.1.1.3 | ||
>=14.0.0<=14.0.0.2 | ||
>=11.5.1<=11.5.8 | ||
>=11.6.1<=11.6.3.2 | ||
>=12.1.0<=12.1.3.7 | ||
>=13.0.0<=13.1.1.3 | ||
>=14.0.0<=14.0.0.2 | ||
>=11.5.1<=11.5.8 | ||
>=11.6.1<=11.6.3.2 | ||
>=12.1.0<=12.1.3.7 | ||
>=13.0.0<=13.1.1.3 | ||
>=14.0.0<=14.0.0.2 | ||
>=11.5.1<=11.5.8 | ||
>=11.6.1<=11.6.3.2 | ||
>=12.1.0<=12.1.3.7 | ||
>=13.0.0<=13.1.1.3 | ||
>=14.0.0<=14.0.0.2 | ||
>=11.5.1<=11.5.8 | ||
>=11.6.1<=11.6.3.2 | ||
>=12.1.0<=12.1.3.7 | ||
>=13.0.0<=13.1.1.3 | ||
>=14.0.0<=14.0.0.2 | ||
>=11.5.1<=11.5.8 | ||
>=11.6.1<=11.6.3.2 | ||
>=12.1.0<=12.1.3.7 | ||
>=13.0.0<=13.1.1.3 | ||
>=14.0.0<=14.0.0.2 | ||
>=11.5.1<=11.5.8 | ||
>=11.6.1<=11.6.3.2 | ||
>=12.1.0<=12.1.3.7 | ||
>=13.0.0<=13.1.1.3 | ||
>=14.0.0<=14.0.0.2 | ||
>=11.5.1<=11.5.8 | ||
>=11.6.1<=11.6.3.2 | ||
>=12.1.0<=12.1.3.7 | ||
>=13.0.0<=13.1.1.3 | ||
>=14.0.0<=14.0.0.2 | ||
>=11.5.1<=11.5.8 | ||
>=11.6.1<=11.6.3.2 | ||
>=12.1.0<=12.1.3.7 | ||
>=13.0.0<=13.1.1.3 | ||
>=14.0.0<=14.0.0.2 | ||
>=11.5.1<=11.5.8 | ||
>=11.6.1<=11.6.3.2 | ||
>=12.1.0<=12.1.3.7 | ||
>=13.0.0<=13.1.1.3 | ||
>=14.0.0<=14.0.0.2 | ||
>=11.5.1<=11.5.8 | ||
>=11.6.1<=11.6.3.2 | ||
>=12.1.0<=12.1.3.7 | ||
>=13.0.0<=13.1.1.3 | ||
>=14.0.0<=14.0.0.2 | ||
>=11.5.1<=11.5.8 | ||
>=11.6.1<=11.6.3.2 | ||
>=12.1.0<=12.1.3.7 | ||
>=13.0.0<=13.1.1.3 | ||
>=14.0.0<=14.0.0.2 | ||
>=11.5.1<=11.5.8 | ||
>=11.6.1<=11.6.3.2 | ||
>=12.1.0<=12.1.3.7 | ||
>=13.0.0<=13.1.1.3 | ||
>=14.0.0<=14.0.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.