A directory traversal vulnerability exists in an undisclosed page of the BIG-IP Configuration utility which may allow an authenticated attacker to read files with .xml extension. Access to restricted information is limited and the attacker does not control what information is obtained.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Link | Resource |
---|---|
https://my.f5.com/manage/s/article/K000132768 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-05-03 15:15
Updated : 2023-10-05 15:52
NVD link : CVE-2023-28406
Mitre link : CVE-2023-28406
CVE.ORG link : CVE-2023-28406
JSON object : View
Products Affected
f5
- big-ip_websafe
- big-ip_domain_name_system
- big-ip_application_security_manager
- big-ip_ddos_hybrid_defender
- big-ip_ssl_orchestrator
- big-ip_link_controller
- big-ip_local_traffic_manager
- big-ip_carrier-grade_nat
- big-ip_fraud_protection_service
- big-ip_global_traffic_manager
- big-ip_edge_gateway
- big-ip_application_acceleration_manager
- big-ip_policy_enforcement_manager
- big-ip_application_visibility_and_reporting
- big-ip_webaccelerator
- big-ip_advanced_web_application_firewall
- big-ip_access_policy_manager
- big-ip_analytics
- big-ip_advanced_firewall_manager
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')