QID 378450

Date Published: 2023-05-02

QID 378450: F5 BIG-IP Apache Vulnerability (K000133098)

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server. (CVE-2023-25690).

Vulnerable Component: BIG-IP All Modules

Affected Versions:
17.0.0 - 17.1.0
16.1.0 - 16.1.3
15.1.0 - 15.1.8
14.1.0 - 14.1.5

QID Detection Logic(Authenticated):
This QID checks for the vulnerable versions of F5 BIG-IP devices using the tmsh command.

An attacker may be able to use a crafted request to bypass access controls of the intermediary device, proxying unintended URLs to the origin servers.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 6.5 severity.
  • Solution
    The vendor has released patch, for more information please visit: K000133098
    Vendor References

    CVEs related to QID 378450

    Software Advisories
    Advisory ID Software Component Link
    K000133098 URL Logo my.f5.com/manage/s/article/K000133098