
28/3/2019

21/11/2024
CVE-2019-6607: CSRF
First published: Thu Mar 28 2019(Updated: )
On BIG-IP ASM 11.5.1-11.5.8, 11.6.1-11.6.3, 12.1.0-12.1.3, 13.0.0-13.1.1.3, and 14.0.0-14.0.0.2, there is a stored cross-site scripting vulnerability in an ASM violation viewed in the Configuration utility. In the worst case, an attacker can store a CSRF which results in code execution as the admin user.
Credit: f5sirt@f5.com f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|
F5 Application Security Manager | >=11.5.1<=11.5.8 | |
F5 Application Security Manager | >=11.6.1<=11.6.3 | |
F5 Application Security Manager | >=12.1.0<=12.1.3 | |
F5 Application Security Manager | >=13.0.0<=13.1.1.3 | |
F5 Application Security Manager | >=14.0.0<=14.0.0.2 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2019-6607?
CVE-2019-6607 has a medium severity rating due to its potential for stored cross-site scripting attacks that could lead to code execution.
How do I fix CVE-2019-6607?
To fix CVE-2019-6607, update your F5 BIG-IP Application Security Manager to a version that is not vulnerable.
What versions are affected by CVE-2019-6607?
CVE-2019-6607 affects F5 BIG-IP Application Security Manager versions 11.5.1 through 11.5.8, 11.6.1 through 11.6.3, 12.1.0 through 12.1.3, 13.0.0 through 13.1.1.3, and 14.0.0 through 14.0.0.2.
Can CVE-2019-6607 lead to unauthorized access?
Yes, CVE-2019-6607 can potentially allow an attacker to execute code as an admin, leading to unauthorized access.
What is the nature of the vulnerability in CVE-2019-6607?
CVE-2019-6607 is a stored cross-site scripting vulnerability that can allow an attacker to inject malicious scripts into the Configuration utility.
- agent/references
- agent/type
- collector/mitre-cve
- source/MITRE
- agent/weakness
- agent/description
- agent/severity
- agent/first-publish-date
- agent/author
- agent/last-modified-date
- agent/softwarecombine
- agent/event
- agent/source
- agent/tags
- collector/nvd-api
- source/NVD
- agent/software-canonical-lookup
- agent/software-canonical-lookup-request
- collector/nvd-index
- vendor/f5
- canonical/f5 application security manager
- version/f5 application security manager/11.5.1
- version/f5 application security manager/11.5.8
- version/f5 application security manager/11.6.1
- version/f5 application security manager/11.6.3
- version/f5 application security manager/12.1.0
- version/f5 application security manager/12.1.3
- version/f5 application security manager/13.0.0
- version/f5 application security manager/13.1.1.3
- version/f5 application security manager/14.0.0
- version/f5 application security manager/14.0.0.2
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203