On BIG-IP APM versions 15.1.x before 15.1.3, 14.1.x before 14.1.4.1, 13.1.x before 13.1.4, and all versions of 16.0.x, 12.1.x, and 11.6.x, an attacker may be able to bypass APM's internal restrictions and retrieve static content that is hosted within APM by sending specifically crafted requests to an APM Virtual Server. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Link | Resource |
---|---|
https://support.f5.com/csp/article/K75540265 | Vendor Advisory |
https://support.f5.com/csp/article/K75540265 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.f5.com/csp/article/K75540265 - Vendor Advisory |
Information
Published : 2021-05-10 15:15
Updated : 2024-11-21 05:51
NVD link : CVE-2021-23016
Mitre link : CVE-2021-23016
CVE.ORG link : CVE-2021-23016
JSON object : View
Products Affected
f5
- big-ip_access_policy_manager
CWE