René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

141 lines
5.0 KiB
JSON

{
"id": "CVE-2021-23016",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2021-05-10T15:15:07.523",
"lastModified": "2021-05-24T12:46:22.790",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "On BIG-IP APM versions 15.1.x before 15.1.3, 14.1.x before 14.1.4.1, 13.1.x before 13.1.4, and all versions of 16.0.x, 12.1.x, and 11.6.x, an attacker may be able to bypass APM's internal restrictions and retrieve static content that is hosted within APM by sending specifically crafted requests to an APM Virtual Server. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
},
{
"lang": "es",
"value": "En BIG-IP APM versiones 15.1.x anteriores a 15.1.3, versiones 14.1.x anteriores a 14.1.4.1, versiones 13.1.x anteriores a 13.1.4 y todas las versiones de 16.0.x, 12.1.x y 11.6.x, un atacante puede ser capaz de omitir las restricciones internas de APM y recuperar contenido est\u00e1tico alojado en APM mediante el env\u00edo de peticiones dise\u00f1adas espec\u00edficamente hacia un servidor virtual de APM. Nota: No se eval\u00faan las versiones de software que hayan alcanzado el End of Technical Support (EoTS)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.6.1",
"versionEndIncluding": "11.6.5",
"matchCriteriaId": "2FBA9552-4645-4BFF-91A4-47B6A3414325"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.1.0",
"versionEndIncluding": "12.1.6",
"matchCriteriaId": "DE2F2CB2-BE96-4DC8-B336-1E9A318B4604"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndExcluding": "13.1.4",
"matchCriteriaId": "0F975B09-678D-49A3-9BCE-C4F3BF45B0BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1.0",
"versionEndExcluding": "14.1.4.1",
"matchCriteriaId": "0981DCE3-53A1-4593-9603-A53613467CB0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.3",
"matchCriteriaId": "5F04F2FB-12C2-4BC4-AFBB-9DA82E53D7EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0.0",
"versionEndIncluding": "16.0.1",
"matchCriteriaId": "EB93F27C-BBDD-4A7E-932A-858C130F39F0"
}
]
}
]
}
],
"references": [
{
"url": "https://support.f5.com/csp/article/K75540265",
"source": "f5sirt@f5.com",
"tags": [
"Vendor Advisory"
]
}
]
}