cve/2019/CVE-2019-6617.md

18 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-6617](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6617)
![](https://img.shields.io/static/v1?label=Product&message=BIG-IP%20(LTM%2C%20AAM%2C%20AFM%2C%20Analytics%2C%20APM%2C%20ASM%2C%20DNS%2C%20Edge%20Gateway%2C%20FPS%2C%20GTM%2C%20Link%20Controller%2C%20PEM%2C%20WebAccelerator)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Privilege%20Escalation&color=brighgreen)
### Description
On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.2-11.5.8, a user with the Resource Administrator role is able to overwrite sensitive low-level files (such as /etc/passwd) using SFTP to modify user permissions, without Advanced Shell access. This is contrary to our definition for the Resource Administrator (RA) role restrictions.
### POC
#### Reference
- https://github.com/mirchr/security-research/blob/master/vulnerabilities/F5/CVE-2019-6617.txt
#### Github
- https://github.com/mirchr/security-research