F5 Multiple BIG-IP Products Configuration Utility Path Traversal Vulnerability


Description   (#A path traversal vulnerability has been identified in the BIG-IP Configuration Utility module included in several F5 products.#A remote authenticated attacker could exploit this vulnerability to gain access to the web root and read its files.##No further information is available.##Updated, 12/10/2015:#A proof of concept is available.)
     
Vulnerable Products   Vulnerable OS:
BIG-IP ASM (F5) - 10.1.0, 10.2.0, 10.2.1, 10.2.1 HF1, 10.2.1 HF2, ..., 11.6.1 HF2, 11.6.2, 11.6.2 HF1, 11.6.3, 11.6.3.1BIG-IP GTM/DNS (F5) - 10.1.0, 10.2.0, 10.2.1, 10.2.1 HF1, 10.2.1 HF2, ..., 11.6.1 HF2, 11.6.2, 11.6.2 HF1, 11.6.3, 11.6.3.1BIG-IP Link Controller (F5) - 10.1.0, 10.2.0, 10.2.1, 10.2.1 HF1, 10.2.1 HF2, ..., 11.6.1 HF2, 11.6.2, 11.6.2 HF1, 11.6.3, 11.6.3.1BIG-IP LTM (F5) - 10.1.0, 10.2.0, 10.2.1, 10.2.1 HF1, 10.2.1 HF2, ..., 11.6.1 HF2, 11.6.2, 11.6.2 HF1, 11.6.3, 11.6.3.1BIG-IP WebAccelerator/AAM (F5) - 10.1.0, 10.2.0, 10.2.1, 10.2.1 HF1, 10.2.1 HF2, ..., 11.6.1 HF2, 11.6.2, 11.6.2 HF1, 11.6.3, 11.6.3.1Enterprise Manager (F5) - 3.0.0, 3.1.0, 3.1.1, 3.1.1 HF1, 3.1.1 HF2, 3.1.1 HF3, 3.1.1 HF4
     
Solution   - BIG-IP Link Controller.
     
CVE   CVE-2015-4040
     
References   - SOL17253 : BIG-IP Configuration utility vulnerability CVE-2015-4040
https://support.f5.com/kb/en-us/solutions/public/17000/200/sol17253.html
- K17253 : BIG-IP Configuration utility vulnerability CVE-2015-4040
https://support.f5.com/csp/article/K17253
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Misc : Directory traversal - parameter starting with ../
3.2.0
Directory traversal using ..\..
3.2.0
Directory traversal
3.2.0
Directory traversal backward root folder
3.2.0
     


 
 
 
 
 Risk level 
Low 

 Vulnerability First Public Report Date 
2015-09-09 

 Target Type 
Server 

 Possible exploit 
Remote