First published: Thu Apr 30 2020(Updated: )
Om BIG-IP 15.0.0-15.0.1.3 and 14.1.0-14.1.2.3, the restjavad process may expose a way for attackers to upload arbitrary files on the BIG-IP system, bypassing the authorization system. Resulting error messages may also reveal internal paths of the server.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Access Policy Manager | >=14.1.0<=14.1.2.3 | |
F5 Access Policy Manager | >=15.0.0<=15.0.1.3 | |
F5 BIG-IP Advanced Firewall Manager | >=14.1.0<=14.1.2.3 | |
F5 BIG-IP Advanced Firewall Manager | >=15.0.0<=15.0.1.3 | |
F5 BIG-IP Analytics | >=14.1.0<=14.1.2.3 | |
F5 BIG-IP Analytics | >=15.0.0<=15.0.1.3 | |
F5 BIG-IP Application Acceleration Manager | >=14.1.0<=14.1.2.3 | |
F5 BIG-IP Application Acceleration Manager | >=15.0.0<=15.0.1.3 | |
F5 Application Security Manager | >=14.1.0<=14.1.2.3 | |
F5 Application Security Manager | >=15.0.0<=15.0.1.3 | |
F5 BIG-IP | >=14.1.0<=14.1.2.3 | |
F5 BIG-IP | >=15.0.0<=15.0.1.3 | |
F5 BIG-IP Fraud Protection Service | >=14.1.0<=14.1.2.3 | |
F5 BIG-IP Fraud Protection Service | >=15.0.0<=15.0.1.3 | |
Riverbed SteelApp Traffic Manager | >=14.1.0<=14.1.2.3 | |
Riverbed SteelApp Traffic Manager | >=15.0.0<=15.0.1.3 | |
F5 BIG-IP Link Controller | >=14.1.0<=14.1.2.3 | |
F5 BIG-IP Link Controller | >=15.0.0<=15.0.1.3 | |
Riverbed SteelApp Traffic Manager | >=14.1.0<=14.1.2.3 | |
Riverbed SteelApp Traffic Manager | >=15.0.0<=15.0.1.3 | |
F5 BIG-IP Policy Enforcement Manager | >=14.1.0<=14.1.2.3 | |
F5 BIG-IP Policy Enforcement Manager | >=15.0.0<=15.0.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5880 has a high severity rating as it allows unauthorized file upload and may reveal sensitive server information.
To fix CVE-2020-5880, upgrade your F5 BIG-IP systems to versions 15.0.1.4 or later, or 14.1.2.4 or later.
CVE-2020-5880 affects F5 BIG-IP version 15.0.0 to 15.0.1.3 and version 14.1.0 to 14.1.2.3 across various modules.
The risks associated with CVE-2020-5880 include unauthorized access for file uploads and the potential exposure of internal server paths.
Currently, no specific workaround is published for CVE-2020-5880; the best action is to apply the recommended update as soon as possible.