CVE-2014-3959CVE-2014-3959

Affected configuration(s):

cpe:/a:f5:big-ip_access_policy_manager:11.2.1
cpe:/a:f5:big-ip_access_policy_manager:11.5.1
cpe:/a:f5:big-ip_advanced_firewall_manager:11.2.1
cpe:/a:f5:big-ip_advanced_firewall_manager:11.5.1
cpe:/a:f5:big-ip_analytics:11.2.1
cpe:/a:f5:big-ip_analytics:11.5.1
cpe:/a:f5:big-ip_application_acceleration_manager:11.4.0
cpe:/a:f5:big-ip_application_acceleration_manager:11.5.1
cpe:/a:f5:big-ip_application_security_manager:11.2.1
cpe:/a:f5:big-ip_application_security_manager:11.5.1
cpe:/a:f5:big-ip_edge_gateway:11.2.1
cpe:/a:f5:big-ip_edge_gateway:11.3.0
cpe:/a:f5:big-ip_global_traffic_manager:11.2.1
cpe:/a:f5:big-ip_global_traffic_manager:11.5.1
cpe:/a:f5:big-ip_link_controller:11.2.1
cpe:/a:f5:big-ip_link_controller:11.5.1
cpe:/a:f5:big-ip_local_traffic_manager:11.2.1
cpe:/a:f5:big-ip_local_traffic_manager:11.5.1
cpe:/a:f5:big-ip_policy_enforcement_manager:11.3.0
cpe:/a:f5:big-ip_policy_enforcement_manager:11.5.1
cpe:/a:f5:big-ip_protocol_security_module:11.2.1
cpe:/a:f5:big-ip_protocol_security_module:11.4.1
cpe:/a:f5:big-ip_wan_optimization_manager:11.2.1
cpe:/a:f5:big-ip_wan_optimization_manager:11.3.0
cpe:/a:f5:big-ip_webaccelerator:11.2.1
cpe:/a:f5:big-ip_webaccelerator:11.3.0
cpe:/a:f5:enterprise_manager:3.0.0
cpe:/a:f5:enterprise_manager:3.1.1

Date published: 2014-06-03T10:55:11.490-04:00

Date last modified: 2016-10-19T12:45:15.223-04:00

CVSS Score: 4.3

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://support.f5.com/kb/en-us/solutions/public/15000/200/sol15296.html

Summary: Cross-site scripting (XSS) vulnerability in list.jsp in the Configuration utility in F5 BIG-IP LTM, AFM, Analytics, APM, ASM, GTM, and Link Controller 11.2.1 through 11.5.1, AAM 11.4.0 through 11.5.1 PEM 11.3.0 through 11.5.1, PSM 11.2.1 through 11.4.1, WebAccelerator and WOM 11.2.1 through 11.3.0, and Enterprise Manager 3.0.0 through 3.1.1 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.