The iControl API in F5 BIG-IP LTM, APM, ASM, GTM, Link Controller, and PSM 10.0.0 through 10.2.4 and 11.0.0 through 11.5.1, BIG-IP AAM 11.4.0 through 11.5.1, BIG-IP AFM and PEM 11.3.0 through 11.5.1, BIG-IP Analytics 11.0.0 through 11.5.1, BIG-IP Edge Gateway, WebAccelerator, WOM 10.1.0 through 10.2.4 and 11.0.0 through 11.3.0, Enterprise Manager 2.1.0 through 2.3.0 and 3.0.0 through 3.1.1, and BIG-IQ Cloud, Device, and Security 4.0.0 through 4.3.0 allows remote administrators to execute arbitrary commands via shell metacharacters in the hostname element in a SOAP request.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
The iControl API in F5 BIG-IP LTM, APM, ASM, GTM, Link Controller, and PSM 10.0.0 through 10.2.4 and 11.0.0 through 11.5.1, BIG-IP AAM 11.4.0 through 11.5.1, BIG-IP AFM and PEM 11.3.0 through 11.5.1, BIG-IP Analytics 11.0.0 through 11.5.1, BIG-IP Edge Gateway, WebAccelerator, WOM 10.1.0 through 10.2.4 and 11.0.0 through 11.3.0, Enterprise Manager 2.1.0 through 2.3.0 and 3.0.0 through 3.1.1, and BIG-IQ Cloud, Device, and Security 4.0.0 through 4.3.0 allows remote administrators to execute arbitrary commands via shell metacharacters in the hostname element in a SOAP request.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://seclists.org/fulldisclosure/2014/May/32 | mailing-list x_refsource_FULLDISC |
http://www.exploit-db.com/exploits/34927 | exploit x_refsource_EXPLOIT-DB |
http://support.f5.com/kb/en-us/solutions/public/15000/200/sol15220.html | x_refsource_CONFIRM |
http://www.osvdb.org/106728 | vdb-entry x_refsource_OSVDB |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://seclists.org/fulldisclosure/2014/May/32 | mailing-list x_refsource_FULLDISC x_transferred |
http://www.exploit-db.com/exploits/34927 | exploit x_refsource_EXPLOIT-DB x_transferred |
http://support.f5.com/kb/en-us/solutions/public/15000/200/sol15220.html | x_refsource_CONFIRM x_transferred |
http://www.osvdb.org/106728 | vdb-entry x_refsource_OSVDB x_transferred |
The iControl API in F5 BIG-IP LTM, APM, ASM, GTM, Link Controller, and PSM 10.0.0 through 10.2.4 and 11.0.0 through 11.5.1, BIG-IP AAM 11.4.0 through 11.5.1, BIG-IP AFM and PEM 11.3.0 through 11.5.1, BIG-IP Analytics 11.0.0 through 11.5.1, BIG-IP Edge Gateway, WebAccelerator, WOM 10.1.0 through 10.2.4 and 11.0.0 through 11.3.0, Enterprise Manager 2.1.0 through 2.3.0 and 3.0.0 through 3.1.1, and BIG-IQ Cloud, Device, and Security 4.0.0 through 4.3.0 allows remote administrators to execute arbitrary commands via shell metacharacters in the hostname element in a SOAP request.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 7.1 | HIGH | AV:N/AC:H/Au:S/C:C/I:C/A:C |
CWE ID | Type | Source |
---|---|---|
NVD-CWE-Other | Primary | nvd@nist.gov |
Hyperlink | Source | Resource |
---|---|---|
http://seclists.org/fulldisclosure/2014/May/32 | cret@cert.org | N/A |
http://support.f5.com/kb/en-us/solutions/public/15000/200/sol15220.html | cret@cert.org | Vendor Advisory |
http://www.exploit-db.com/exploits/34927 | cret@cert.org | Exploit |
http://www.osvdb.org/106728 | cret@cert.org | N/A |
http://seclists.org/fulldisclosure/2014/May/32 | af854a3a-2127-422b-91ae-364da2661108 | N/A |
http://support.f5.com/kb/en-us/solutions/public/15000/200/sol15220.html | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
http://www.exploit-db.com/exploits/34927 | af854a3a-2127-422b-91ae-364da2661108 | Exploit |
http://www.osvdb.org/106728 | af854a3a-2127-422b-91ae-364da2661108 | N/A |