First published: Wed Feb 21 2024(Updated: )
This flaw allows a malicious HTTP server to set "super cookies" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl's function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Next (LTM) | >=20.0.1<=20.0.2 | 20.1.0 |
F5 BIG-IP Next Central Manager | >=20.0.1<=20.0.2 | 20.1.0 |
F5 BIG-IP Next | >=1.7.0<=1.9.1 | |
F5 BIG-IP Next | >=1.1.0<=1.2.1 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.1 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.4 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=8.0.0<=8.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
F5-K000138650 is considered a medium severity vulnerability due to its potential to allow super cookies to be set by malicious servers.
To fix F5-K000138650, users should upgrade to the latest version of the affected products, specifically version 20.1.0 or above.
Affected software versions for F5-K000138650 include certain versions of F5 BIG-IP, BIG-IP Next, BIG-IP Next Central Manager, and others based on the specified version ranges.
If F5-K000138650 is exploited, it could enable a malicious HTTP server to set cookies that are incorrectly shared across multiple unrelated sites, compromising user data.
Currently, the recommended mitigation for F5-K000138650 is to apply the necessary software updates to prevent exploitation.