cvelist/2019/6xxx/CVE-2019-6600.json

68 lines
2.4 KiB
JSON
Raw Normal View History

2019-01-22 16:04:06 -05:00
{
2019-03-17 22:38:59 +00:00
"CVE_data_meta": {
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2019-03-11T00:00:00",
"ID": "CVE-2019-6600",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator)",
"version": {
"version_data": [
{
"version_value": "14.0.0-14.0.0.2, 13.0.0-13.1.1.3, 12.1.0-12.1.3.7, 11.6.1-11.6.3.2, 11.5.1-11.5.8"
}
]
}
}
]
},
"vendor_name": "F5 Networks, Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2019-03-13 17:30:04 -04:00
{
2019-03-17 22:38:59 +00:00
"lang": "eng",
"value": "In BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.1.3, 12.1.0-12.1.3.7, 11.6.1-11.6.3.2, or 11.5.1-11.5.8, when remote authentication is enabled for administrative users and all external users are granted the \"guest\" role, unsanitized values can be reflected to the client via the login page. This can lead to a cross-site scripting attack against unauthenticated clients."
2019-03-13 17:30:04 -04:00
}
2019-03-17 22:38:59 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "XSS"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.f5.com/csp/article/K23734425",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K23734425"
2019-03-19 17:00:49 +00:00
},
{
"refsource": "BID",
"name": "107470",
"url": "http://www.securityfocus.com/bid/107470"
2019-03-17 22:38:59 +00:00
}
]
}
}