7 results (0.010 seconds)

CVSS: 7.8EPSS: 27%CPEs: 114EXPL: 4

F5 BIG-IP appliances 9.x before 9.4.8-HF5, 10.x before 10.2.4, 11.0.x before 11.0.0-HF2, and 11.1.x before 11.1.0-HF3, and Enterprise Manager before 2.1.0-HF2, 2.2.x before 2.2.0-HF1, and 2.3.x before 2.3.0-HF3, use a single SSH private key across different customers' installations and do not properly restrict access to this key, which makes it easier for remote attackers to perform SSH logins via the PubkeyAuthentication option. El dispositivo F5 BIG-IP v9.x anteriores a v9.4.8-HF5, v10.x anteriores a v10.2.4, v11.0.x anteriores a v11.0.0-HF2, y v11.1.x anteriores a v11.1.0-HF3, y Enterprise Manager anteriores a v2.1.0-HF2, v2.2.x anteriores a v2.2.0-HF1, y v2.3.x anteriores a v2.3.0-HF3, usa una clave privada SSH en distintas instalaciones de clientes, y no restringe el acceso a la mismas de forma adecuada, lo que facilita a atacantes remotos hacer login SSH a través de la opción PubkeyAuthentication. F5 ships a public/private key pair on BIG-IP appliances that allows passwordless authentication to any other BIG-IP box. Since the key is easily retrievable, an attacker can use it to gain unauthorized remote access as root. • https://www.exploit-db.com/exploits/19064 https://www.exploit-db.com/exploits/19091 https://www.exploit-db.com/exploits/19099 http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html http://www.theregister.co.uk/2012/06/13/f5_kit_metasploit_exploit https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb https://www.trustmatta.com/advisories/MATTA-2012-002.txt • CWE-255: Credentials Management Errors •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

The management interface in F5 BIG-IP 9.4.3 allows remote authenticated users with Resource Manager privileges to inject arbitrary Perl code via unspecified configuration settings related to Perl EP3 with templates, probably triggering static code injection. El interfaz de gestión en F5 BIG-IP v9.4.3 permite a usuarios remotos autenticados con privilegios de "Resource Manager" inyectar código Perl de su elección mediante parámetros de configuración no especificados relacionados a Perl EP3 con plantillas, provocando probablemente la inyección de código estático. • http://osvdb.org/51116 http://www.securityfocus.com/archive/1/490496/100/0/threaded http://www.securityfocus.com/bid/28639 https://exchange.xforce.ibmcloud.com/vulnerabilities/49308 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in the web management interface in F5 BIG-IP 9.4.3 allows remote attackers to inject arbitrary web script or HTML via (1) the name of a node object, or the (2) sysContact or (3) sysLocation SNMP configuration field, aka "Audit Log XSS." NOTE: these issues might be resultant from cross-site request forgery (CSRF) vulnerabilities. Vulnerabilidad de Secuencias de comandos en sitios cruzados (XSS) en el interfaz de gestión web en F5 BIG-IP 9.4.3, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante (1) el nombre del objeto node, o el (2) sysContact o el (3) campo de configuración SNMP sysLocation, también conocido como "Audit Log XSS". NOTA: esta característica podría ser resultado de vulnerabilidades de falsificación de petición en sitios cruzados (CSRF). • http://securityreason.com/securityalert/3778 http://www.securityfocus.com/archive/1/489991/100/0/threaded http://www.securityfocus.com/bid/28416 https://exchange.xforce.ibmcloud.com/vulnerabilities/41440 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in the Search function in the web management interface in F5 BIG-IP 9.4.3 allow remote attackers to inject arbitrary web script or HTML via the SearchString parameter to (1) list_system.jsp, (2) list_pktfilter.jsp, (3) list_ltm.jsp, (4) resources_audit.jsp, and (5) list_asm.jsp in tmui/Control/jspmap/tmui/system/log/; and (6) list.jsp in certain directories. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en la función Search en el interfaz de gestión web en F5 BIG-IP 9.4.3 permite a atacantes remotos inyectar secuencias de comandos web de su elección o a través de HTML el parámetro SearchString en (1) list_system.jsp, (2) list_pktfilter.jsp, (3) list_ltm.jsp, (4) resources_audit.jsp, y (5) list_asm.jsp en tmui/Control/jspmap/tmui/system/log/; y (6) list.jsp en ciertos directorios. • https://www.exploit-db.com/exploits/31024 http://secunia.com/advisories/28505 http://securityreason.com/securityalert/3545 http://www.securityfocus.com/archive/1/486217/100/0/threaded http://www.securityfocus.com/bid/27272 http://www.securitytracker.com/id?1019190 http://www.vupen.com/english/advisories/2008/0181 https://exchange.xforce.ibmcloud.com/vulnerabilities/39632 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

Unknown vulnerability in F5 BIG-IP 9.0.2 through 9.1 allows attackers to "subvert the authentication of SSL transactions," via unknown attack vectors, possibly involving NATIVE ciphers. • http://secunia.com/advisories/16008 http://securitytracker.com/id?1014452 http://tech.f5.com/home/bigip-next/solutions/security/sol4944.html http://www.securityfocus.com/bid/14215 •