On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, a directory traversal vulnerability exists in iControl SOAP that allows an authenticated attacker with at least guest role privileges to read wsdl files in the BIG-IP file system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
References
Link | Resource |
---|---|
https://support.f5.com/csp/article/K59904248 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-05-05 17:15
Updated : 2024-02-28 19:09
NVD link : CVE-2022-29474
Mitre link : CVE-2022-29474
CVE.ORG link : CVE-2022-29474
JSON object : View
Products Affected
f5
- big-ip_analytics
- big-ip_link_controller
- big-ip_access_policy_manager
- big-ip_global_traffic_manager
- big-ip_fraud_protection_service
- big-ip_advanced_firewall_manager
- big-ip_local_traffic_manager
- big-ip_policy_enforcement_manager
- big-ip_application_security_manager
- big-ip_application_acceleration_manager
- big-ip_domain_name_system
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')