On BIG-IP APM versions 15.1.x before 15.1.3, 14.1.x before 14.1.4.1, 13.1.x before 13.1.4, and all versions of 16.0.x, 12.1.x, and 11.6.x, an attacker may be able to bypass APM's internal restrictions and retrieve static content that is hosted within APM by sending specifically crafted requests to an APM Virtual Server. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-10134 On BIG-IP APM versions 15.1.x before 15.1.3, 14.1.x before 14.1.4.1, 13.1.x before 13.1.4, and all versions of 16.0.x, 12.1.x, and 11.6.x, an attacker may be able to bypass APM's internal restrictions and retrieve static content that is hosted within APM by sending specifically crafted requests to an APM Virtual Server. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: f5

Published:

Updated: 2024-08-03T18:58:26.272Z

Reserved: 2021-01-06T00:00:00

Link: CVE-2021-23016

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-05-10T15:15:07.523

Modified: 2024-11-21T05:51:09.377

Link: CVE-2021-23016

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.