2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2020-5945" ,
"sourceIdentifier" : "f5sirt@f5.com" ,
"published" : "2020-11-05T20:15:17.897" ,
2024-11-23 13:10:58 +00:00
"lastModified" : "2024-11-21T05:34:52.810" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In BIG-IP versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, and 14.1.0-14.1.2.7, undisclosed TMUI page contains a stored cross site scripting vulnerability (XSS). The issue allows a minor privilege escalation for resource admin to escalate to full admin."
} ,
{
"lang" : "es" ,
"value" : "En BIG-IP versiones 16.0.0-16.0.0.1, 15.1.0-15.1.0.5 y 14.1.0-14.1.2.7, la p\u00e1gina TMUI no revelada contiene una vulnerabilidad de tipo cross site scripting almacenado. El problema permite una escalada de privilegios menor para un administrador de recursos escalar a administrador total"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 8.4 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 1.7 ,
"impactScore" : 6.0
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:S/C:C/I:C/A:C" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 8.5 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 6.8 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndExcluding" : "14.1.2.8" ,
"matchCriteriaId" : "874C243A-5A16-4942-AE90-A1B0D4078192"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndExcluding" : "15.1.1" ,
"matchCriteriaId" : "C0F7F86F-EB88-44C8-83A4-2FC48CF39B73"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.0.0" ,
"versionEndExcluding" : "16.0.1" ,
"matchCriteriaId" : "3F3F98DD-C142-4030-AD11-A3129D5FFEA9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndExcluding" : "14.1.2.8" ,
"matchCriteriaId" : "81A56F9E-5939-4252-8643-0F768AE39E79"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndExcluding" : "15.1.1" ,
"matchCriteriaId" : "60500DD5-0163-40B8-961B-64E1634B456F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.0.0" ,
"versionEndExcluding" : "16.0.1" ,
"matchCriteriaId" : "1247022A-F95F-4DF6-87AC-2E6757B01DC3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndExcluding" : "14.1.2.8" ,
"matchCriteriaId" : "350E17D3-C6D3-407F-B413-0D3D07A9A735"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndExcluding" : "15.1.1" ,
"matchCriteriaId" : "4B62CF9F-F861-4AA3-9B2C-EDDA465BA06A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.0.0" ,
"versionEndExcluding" : "16.0.1" ,
"matchCriteriaId" : "F491CF7C-EC9A-4413-9B84-459FE83E0AF5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndExcluding" : "14.1.2.8" ,
"matchCriteriaId" : "AF90FBA3-69FA-4053-A749-E7F635A284C1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndExcluding" : "15.1.1" ,
"matchCriteriaId" : "4770A77A-13EF-4E35-B006-48018F617FAA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.0.0" ,
"versionEndExcluding" : "16.0.1" ,
"matchCriteriaId" : "D54A135F-CD1E-41AD-82C3-F15A21AA87BE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndExcluding" : "14.1.2.8" ,
"matchCriteriaId" : "A76C1855-461C-4539-98CD-C22363B8AFE8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndExcluding" : "15.1.1" ,
"matchCriteriaId" : "FDD7AFF9-61D8-4D1B-BAD6-F74AD0CD364E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.0.0" ,
"versionEndExcluding" : "16.0.1" ,
"matchCriteriaId" : "C3B360C4-C9E2-4889-ADD5-3482E69BA8E7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndExcluding" : "14.1.2.8" ,
"matchCriteriaId" : "786C0192-BC78-463F-8305-E890F63F153B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndExcluding" : "15.1.1" ,
"matchCriteriaId" : "61441082-FDA0-485E-B945-E6216DCCED43"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.0.0" ,
"versionEndExcluding" : "16.0.1" ,
"matchCriteriaId" : "B7466098-C689-4E4B-879F-0433A020FDBC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndExcluding" : "14.1.2.8" ,
"matchCriteriaId" : "3798475B-3AA3-4DA2-A933-D49024C5C8C3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndExcluding" : "15.1.1" ,
"matchCriteriaId" : "DAB5474D-11C7-4CA1-9386-8F12FD95CCB6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.0.0" ,
"versionEndExcluding" : "16.0.1" ,
"matchCriteriaId" : "574397F4-0234-48D3-B024-D7963A41E21C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndExcluding" : "14.1.2.8" ,
"matchCriteriaId" : "50DCC8F9-3393-4131-9B85-EBC2F9EEF4D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndExcluding" : "15.1.1" ,
"matchCriteriaId" : "B5F5C326-1BCE-47FC-A334-B485C755AAE6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.0.0" ,
"versionEndExcluding" : "16.0.1" ,
"matchCriteriaId" : "EB7047B3-A248-424C-98D8-A0DD99A86F50"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndExcluding" : "14.1.2.8" ,
"matchCriteriaId" : "75AB65FB-DC81-4F50-BC2A-BCAD1EC22635"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndExcluding" : "15.1.1" ,
"matchCriteriaId" : "0E48624E-6D03-423A-9232-6847E4A0AAFB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.0.0" ,
"versionEndExcluding" : "16.0.1" ,
"matchCriteriaId" : "15439AAC-1535-4087-9170-C885716736F4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndExcluding" : "14.1.2.8" ,
"matchCriteriaId" : "66B64305-66FB-4C99-BD1A-BFE7BE23EE87"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndExcluding" : "15.1.1" ,
"matchCriteriaId" : "FD2B708E-78D3-4016-9176-C364CBE20DA8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.0.0" ,
"versionEndExcluding" : "16.0.1" ,
"matchCriteriaId" : "4F9D19B2-1D89-4917-A82E-289EDE52C68F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndExcluding" : "14.1.2.8" ,
"matchCriteriaId" : "8134C56F-5979-4501-99BC-40A9921EAAE3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndExcluding" : "15.1.1" ,
"matchCriteriaId" : "240E6558-C486-4FEB-A7AC-CCB3692D4331"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.0.0" ,
"versionEndExcluding" : "16.0.1" ,
"matchCriteriaId" : "E0319299-FCCE-4B8F-8DB5-83AF0C3D68D5"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://support.f5.com/csp/article/K21540525" ,
"source" : "f5sirt@f5.com" ,
"tags" : [
"Vendor Advisory"
]
2024-11-23 13:10:58 +00:00
} ,
{
"url" : "https://support.f5.com/csp/article/K21540525" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}