First published: Mon Aug 21 2023(Updated: )
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | =17.1.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.4 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.9 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=14.1.0<=14.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=13.1.0<=13.1.5 | |
F5 BIG-IP Next | =1.1.0 | |
F5 BIG-IP Next | >=1.5.0<=1.8.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=8.0.0<=8.4.0 | |
F5 F5OS | >=1.5.0<=1.5.1=1.4.0>=1.3.0<=1.3.2 | 1.7.0 |
F5 F5OS | >=1.5.0<=1.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
F5-K000135921 is classified as a medium severity vulnerability due to its potential to allow attackers to bypass security controls.
To remediate F5-K000135921, upgrade to the patched versions specified in the advisory for affected F5 BIG-IP and F5OS products.
F5-K000135921 affects multiple versions of F5 BIG-IP, BIG-IQ, and F5OS products as detailed in the vulnerability report.
Yes, F5-K000135921 can potentially lead to data breaches if exploited, as it allows attackers to bypass blocklisting measures.
Currently, the most effective measure against F5-K000135921 is to update the affected F5 products to their recommended versions.