The TMM SSO plugin in F5 BIG-IP APM 12.0.0 - 12.1.1, 11.6.0 - 11.6.1 HF1, 11.5.4 - 11.5.4 HF2, when configured as a SAML Identity Provider with a Service Provider (SP) connector, might allow traffic to be disrupted or failover initiated when a malformed, signed SAML authentication request from an authenticated user is sent via the SP connector.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/97168 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038131 | |
https://support.f5.com/csp/article/K95444512 | Vendor Advisory |
http://www.securityfocus.com/bid/97168 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038131 | |
https://support.f5.com/csp/article/K95444512 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/97168 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1038131 - | |
References | () https://support.f5.com/csp/article/K95444512 - Vendor Advisory |
Information
Published : 2017-04-11 14:59
Updated : 2024-11-21 02:58
NVD link : CVE-2016-7467
Mitre link : CVE-2016-7467
CVE.ORG link : CVE-2016-7467
JSON object : View
Products Affected
f5
- big-ip_access_policy_manager
CWE
CWE-20
Improper Input Validation