Vigil@nce - F5 BIG-IP: Cross Site Request Forgery via TMUI
January 2017 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can trigger a Cross Site Request Forgery via TMUI of
F5 BIG-IP, in order to force the victim to perform operations.
– Impacted products: BIG-IP Hardware, TMOS.
– Severity: 2/4.
– Creation date: 04/11/2016.
DESCRIPTION OF THE VULNERABILITY
The F5 BIG-IP product offers a web service via Traffic Management
User Interface.
However, the origin of queries is not checked. They can for
example originate from an image included in an HTML document.
An attacker can therefore trigger a Cross Site Request Forgery via
TMUI of F5 BIG-IP, in order to force the victim to perform
operations.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/F5-BIG-IP-Cross-Site-Request-Forgery-via-TMUI-21044