Vigil@nce - F5 BIG-IP: directory traversal
November 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can traverse directories of F5 BIG-IP, in order to
detect a file outside the service root path, and then to delete it.
Impacted products: BIG-IP Appliance
Severity: 2/4
Creation date: 13/11/2014
DESCRIPTION OF THE VULNERABILITY
The F5 BIG-IP product offers a web service.
However, queries of users with the "Resource Administrator" or
"Administrator" privilege are directly inserted in an access path.
Sequences such as "/.." can thus be used to go in the upper
directory.
An attacker can therefore traverse directories of F5 BIG-IP, in
order to detect a file outside the service root path, and then to
delete it.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/F5-BIG-IP-directory-traversal-15639