Vigil@nce - F5 BIG-IP: Cross Site Request Forgery via Configuration Utility
January 2017 by Vigil@nce
SYNTHESIS OF THE VULNERABILITY
An attacker can trigger a Cross Site Request Forgery via
Configuration Utility of F5 BIG-IP, in order to force the victim
to perform operations.
Impacted products: BIG-IP Hardware, TMOS.
Severity: 2/4.
Creation date: 09/11/2016.
DESCRIPTION OF THE VULNERABILITY
The F5 BIG-IP product offers a web service.
However, the origin of queries is not checked. They can for
example originate from an image included in an HTML document.
An attacker can therefore trigger a Cross Site Request Forgery via
Configuration Utility of F5 BIG-IP, in order to force the victim
to perform operations.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/F5-BIG-IP-Cross-Site-Request-Forgery-via-Configuration-Utility-21085