A directory traversal vulnerability exists in an undisclosed page of the BIG-IP Configuration utility which may allow an authenticated attacker to read files with .xml extension. Access to restricted information is limited and the attacker does not control what information is obtained.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Link | Resource |
---|---|
https://my.f5.com/manage/s/article/K000132768 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
05 Oct 2023, 15:52
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
Information
Published : 2023-05-03 15:15
Updated : 2024-02-28 20:13
NVD link : CVE-2023-28406
Mitre link : CVE-2023-28406
CVE.ORG link : CVE-2023-28406
JSON object : View
Products Affected
f5
- big-ip_advanced_firewall_manager
- big-ip_local_traffic_manager
- big-ip_ddos_hybrid_defender
- big-ip_application_acceleration_manager
- big-ip_webaccelerator
- big-ip_domain_name_system
- big-ip_link_controller
- big-ip_edge_gateway
- big-ip_websafe
- big-ip_application_visibility_and_reporting
- big-ip_global_traffic_manager
- big-ip_application_security_manager
- big-ip_advanced_web_application_firewall
- big-ip_analytics
- big-ip_access_policy_manager
- big-ip_fraud_protection_service
- big-ip_policy_enforcement_manager
- big-ip_carrier-grade_nat
- big-ip_ssl_orchestrator
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')