Sensitive File Overwrite Vulnerability in BIG-IP by F5 Networks
CVE-2019-6617
Key Information:
- Vendor
- F5
- Vendor
- CVE Published:
- 3 May 2019
Summary
On certain versions of BIG-IP by F5 Networks, users assigned the Resource Administrator role can exploit a vulnerability that allows them to overwrite sensitive low-level files, such as '/etc/passwd', using SFTP. This occurs without requiring Advanced Shell access, which contravenes the defined restrictions for the Resource Administrator role. This flaw exposes critical system files to unauthorized modifications, potentially leading to unauthorized access and privilege escalation.
Affected Version(s)
BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator) 14.0.0-14.1.0.1
BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator) 13.0.0-13.1.1.4
BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator) 12.1.0-12.1.4
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved