CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
73.1%
Multiple SQL injection vulnerabilities in sam/admin/reports/php/saveSettings.php in the (1) APM WebGUI in F5 BIG-IP LTM, GTM, ASM, Link Controller, PSM, APM, Edge Gateway, and Analytics and (2) AVR WebGUI in WebAccelerator and WOM 11.2.x before 11.2.0-HF3 and 11.2.x before 11.2.1-HF3 allow remote authenticated users to execute arbitrary SQL commands via the defaultQuery parameter.
Vendor | Product | Version | CPE |
---|---|---|---|
f5 | big-ip_webaccelerator | 11.0.0 | cpe:2.3:a:f5:big-ip_webaccelerator:11.0.0:*:*:*:*:*:*:* |
f5 | big-ip_webaccelerator | 11.1.0 | cpe:2.3:a:f5:big-ip_webaccelerator:11.1.0:*:*:*:*:*:*:* |
f5 | big-ip_webaccelerator | 11.2.0 | cpe:2.3:a:f5:big-ip_webaccelerator:11.2.0:*:*:*:*:*:*:* |
f5 | big-ip_webaccelerator | 11.2.1 | cpe:2.3:a:f5:big-ip_webaccelerator:11.2.1:*:*:*:*:*:*:* |
f5 | big-ip_global_traffic_manager | 11.0.0 | cpe:2.3:a:f5:big-ip_global_traffic_manager:11.0.0:*:*:*:*:*:*:* |
f5 | big-ip_global_traffic_manager | 11.0.0 | cpe:2.3:a:f5:big-ip_global_traffic_manager:11.0.0:hf1:*:*:*:*:*:* |
f5 | big-ip_global_traffic_manager | 11.1.0 | cpe:2.3:a:f5:big-ip_global_traffic_manager:11.1.0:*:*:*:*:*:*:* |
f5 | big-ip_global_traffic_manager | 11.1.0 | cpe:2.3:a:f5:big-ip_global_traffic_manager:11.1.0:hf2:*:*:*:*:*:* |
f5 | big-ip_global_traffic_manager | 11.2.0 | cpe:2.3:a:f5:big-ip_global_traffic_manager:11.2.0:*:*:*:*:*:*:* |
f5 | big-ip_global_traffic_manager | 11.2.1 | cpe:2.3:a:f5:big-ip_global_traffic_manager:11.2.1:*:*:*:*:*:*:* |
archives.neohapsis.com/archives/bugtraq/2013-01/0094.html
osvdb.org/89446
packetstormsecurity.com/files/119739/F5-BIG-IP-11.2.0-SQL-Injection.html
secunia.com/advisories/51867
support.f5.com/kb/en-us/solutions/public/14000/100/sol14154.html
www.securityfocus.com/bid/57500
exchange.xforce.ibmcloud.com/vulnerabilities/81457
www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20130122-1_F5_BIG-IP_SQL_Injection_v10.txt