On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.3, 14.1.x before 14.1.4, and 13.1.x before 13.1.4, lack of input validation for items used in the system support functionality may allow users granted either "Resource Administrator" or "Administrator" roles to execute arbitrary bash commands on BIG-IP. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Link | Resource |
---|---|
https://support.f5.com/csp/article/K04234247 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-05-10 15:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-23012
Mitre link : CVE-2021-23012
CVE.ORG link : CVE-2021-23012
JSON object : View
Products Affected
f5
- big-ip_advanced_web_application_firewall
- big-ip_analytics
- big-ip_link_controller
- big-ip_access_policy_manager
- big-ip_global_traffic_manager
- big-ip_fraud_protection_service
- big-ip_advanced_firewall_manager
- big-ip_local_traffic_manager
- big-ip_policy_enforcement_manager
- big-ip_application_security_manager
- big-ip_ddos_hybrid_defender
- big-ip_application_acceleration_manager
- big-ip_ssl_orchestrator
- big-ip_domain_name_system
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')