The Single Sign-On (SSO) feature in F5 BIG-IP APM 11.x before 11.6.0 HF6 and BIG-IP Edge Gateway 11.0.0 through 11.3.0 might allow remote attackers to obtain sensitive SessionId information by leveraging access to the Location HTTP header in a redirect.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securitytracker.com/id/1035519 - | |
References | () https://support.f5.com/kb/en-us/solutions/public/k/82/sol82679059.html - Vendor Advisory |
Information
Published : 2016-04-13 16:59
Updated : 2024-11-21 02:50
NVD link : CVE-2016-3686
Mitre link : CVE-2016-3686
CVE.ORG link : CVE-2016-3686
JSON object : View
Products Affected
f5
- big-ip_access_policy_manager
- big-ip_edge_gateway
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor