ID

VAR-201903-0018


CVE

CVE-2019-6607


TITLE

BIG-IP ASM Vulnerable to cross-site request forgery

Trust: 0.8

sources: JVNDB: JVNDB-2019-003218

DESCRIPTION

On BIG-IP ASM 11.5.1-11.5.8, 11.6.1-11.6.3, 12.1.0-12.1.3, 13.0.0-13.1.1.3, and 14.0.0-14.0.0.2, there is a stored cross-site scripting vulnerability in an ASM violation viewed in the Configuration utility. In the worst case, an attacker can store a CSRF which results in code execution as the admin user. BIG-IP ASM Contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. F5 Networks BIG-IP Application Security Manager is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. BIG-IP ASM versions 11.5.1 through 11.5.8, 11.6.1 through 11.6.3, 12.1.0 through 12.1.3, 13.0.0 through 13.1.1.3 and 14.0.0 through 14.0.0.2 are vulnerable. F5 BIG-IP Application Security Manager (ASM) is a Web Application Firewall (WAF) of F5 Corporation in the United States, which provides secure remote access, protects emails, simplifies Web access control, and enhances network and application performance. A remote attacker could exploit this vulnerability to inject malicious scripts

Trust: 1.98

sources: NVD: CVE-2019-6607 // JVNDB: JVNDB-2019-003218 // BID: 107630 // VULHUB: VHN-158042

AFFECTED PRODUCTS

vendor:f5model:big-ip application security managerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:11.6.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:13.1.1.3

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:11.6.3

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:14.0.0.2

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:12.1.3

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:11.5.8

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:11.5.1 to 11.5.8

Trust: 0.8

vendor:f5model:big-ip application security managerscope:eqversion:11.6.1 to 11.6.3

Trust: 0.8

vendor:f5model:big-ip application security managerscope:eqversion:12.1.0 to 12.1.3

Trust: 0.8

vendor:f5model:big-ip application security managerscope:eqversion:13.0.0 to 13.1.1.3

Trust: 0.8

vendor:f5model:big-ip application security managerscope:eqversion:14.0.0 to 14.0.0.2

Trust: 0.8

vendor:f5model:big-ip asmscope:eqversion:14.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:13.1.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:13.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip asm hf3scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip asm hf2scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip asm hf1scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:12.1.3

Trust: 0.3

vendor:f5model:big-ip asm hf2scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip asm hf1scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:12.1.1

Trust: 0.3

vendor:f5model:big-ip asm hf2scope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip asm hf1scope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.6.3

Trust: 0.3

vendor:f5model:big-ip asm hf1scope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip asm hf2scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip asm hf1scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.8

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.7

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.6

Trust: 0.3

vendor:f5model:big-ip asm hf3scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip asm hf2scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip asm hf1scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip asm buildscope:eqversion:11.5.40.1.256

Trust: 0.3

vendor:f5model:big-ip asm hf2scope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.2

Trust: 0.3

vendor:f5model:big-ip asm hf6scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip asm hf11scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip asm hf10scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip asm buildscope:eqversion:11.5.110.104.180

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:14.0.0.2

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:13.1.1.2

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:13.1.0.8

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:13.1.0.6

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:13.1.0.5

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:13.1.0.4

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:13.1.0.2

Trust: 0.3

vendor:f5model:big-ip asm hf1scope:eqversion:12.1.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:12.1.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.5

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip asm hf1scope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:14.1

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:12.1.4

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:11.6.4

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:11.5.9

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:14.0.0.3

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:13.1.1.4

Trust: 0.3

sources: BID: 107630 // JVNDB: JVNDB-2019-003218 // NVD: CVE-2019-6607

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-6607
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-6607
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201903-846
value: MEDIUM

Trust: 0.6

VULHUB: VHN-158042
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-6607
severity: MEDIUM
baseScore: 6.0
vectorString: AV:N/AC:M/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.8
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-158042
severity: MEDIUM
baseScore: 6.0
vectorString: AV:N/AC:M/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.8
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-6607
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-158042 // JVNDB: JVNDB-2019-003218 // CNNVD: CNNVD-201903-846 // NVD: CVE-2019-6607

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.9

sources: VULHUB: VHN-158042 // JVNDB: JVNDB-2019-003218 // NVD: CVE-2019-6607

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201903-846

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201903-846

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-003218

PATCH

title:K14812883url:https://support.f5.com/csp/article/K14812883

Trust: 0.8

title:F5 BIG-IP ASM Fixes for cross-site scripting vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=90329

Trust: 0.6

sources: JVNDB: JVNDB-2019-003218 // CNNVD: CNNVD-201903-846

EXTERNAL IDS

db:NVDid:CVE-2019-6607

Trust: 2.8

db:BIDid:107630

Trust: 2.0

db:JVNDBid:JVNDB-2019-003218

Trust: 0.8

db:CNNVDid:CNNVD-201903-846

Trust: 0.7

db:AUSCERTid:ESB-2019.0934

Trust: 0.6

db:CNVDid:CNVD-2020-61644

Trust: 0.1

db:VULHUBid:VHN-158042

Trust: 0.1

sources: VULHUB: VHN-158042 // BID: 107630 // JVNDB: JVNDB-2019-003218 // CNNVD: CNNVD-201903-846 // NVD: CVE-2019-6607

REFERENCES

url:https://support.f5.com/csp/article/k14812883

Trust: 2.0

url:http://www.securityfocus.com/bid/107630

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-6607

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6607

Trust: 0.8

url:https://www.auscert.org.au/bulletins/77570

Trust: 0.6

url:https://vigilance.fr/vulnerability/f5-big-ip-asm-cross-site-scripting-via-viewed-asm-violation-28817

Trust: 0.6

url:http://www.f5.com/products/big-ip/big-ip-application-security-manager/overview

Trust: 0.3

sources: VULHUB: VHN-158042 // BID: 107630 // JVNDB: JVNDB-2019-003218 // CNNVD: CNNVD-201903-846 // NVD: CVE-2019-6607

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 107630

SOURCES

db:VULHUBid:VHN-158042
db:BIDid:107630
db:JVNDBid:JVNDB-2019-003218
db:CNNVDid:CNNVD-201903-846
db:NVDid:CVE-2019-6607

LAST UPDATE DATE

2024-11-23T23:11:55.335000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-158042date:2019-04-05T00:00:00
db:BIDid:107630date:2019-03-21T00:00:00
db:JVNDBid:JVNDB-2019-003218date:2019-05-13T00:00:00
db:CNNVDid:CNNVD-201903-846date:2019-04-08T00:00:00
db:NVDid:CVE-2019-6607date:2024-11-21T04:46:47.667

SOURCES RELEASE DATE

db:VULHUBid:VHN-158042date:2019-03-28T00:00:00
db:BIDid:107630date:2019-03-21T00:00:00
db:JVNDBid:JVNDB-2019-003218date:2019-05-13T00:00:00
db:CNNVDid:CNNVD-201903-846date:2019-03-22T00:00:00
db:NVDid:CVE-2019-6607date:2019-03-28T21:29:00.773