QID 376060
Date Published: 2021-11-22
QID 376060: F5 BIG-IP Application Security Manager (ASM), Access Policy Manager (APM), Local Traffic Manager (LTM) Python Vulnerability (K57542514)
Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. CVE-2019-9636
Vulnerable Component: BIG-IP APM,LTM,ASM
Affected Versions:
16.0.0 - 16.0.1
15.1.0 - 15.1.2
14.1.0 - 14.1.3
13.1.0 - 13.1.3
12.1.0 - 12.1.6
11.6.1 - 11.6.5
QID Detection Logic(Authenticated):
This QID checks for the vulnerable versions of F5 BIG-IP devices using the tmsh command.
A remote attacker may be able to use a specially crafted URL to locate cookies or authentication data and send that information to a different host than when parsed correctly. BIG-IP Extended Application Verification (EAV) monitors using the Python urlsplit() function with URLs from an untrusted source may be impacted by this vulnerability.
- K57542514 -
support.f5.com/csp/article/K57542514
CVEs related to QID 376060
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| K57542514 |
|