ID

VAR-202008-0936


CVE

CVE-2020-5920


TITLE

BIG-IP AFM In SQL Injection vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2020-010317

DESCRIPTION

In versions 15.0.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, a vulnerability in the BIG-IP AFM Configuration utility may allow any authenticated BIG-IP user to perform a read-only blind SQL injection attack. BIG-IP AFM To SQL An injection vulnerability exists.Information may be obtained. F5 BIG-IP AFM is an advanced firewall device. Remote attackers can use this vulnerability to submit special SQL requests, manipulate databases, obtain sensitive information or execute arbitrary codes. BIG-IP AFM versions between 15.0.0 and 15.1.0.5, versions between 14.1.0 and 14.1.2.7, versions between 13.1.0 and 13.1.3.4, versions between 12.1.0 and 12.1.5.1 and 11.6. There are security vulnerabilities in versions between 1 and 11.6.5.1, which are caused by the lack of validation of externally input SQL statements in database-based applications. Attackers can exploit this vulnerability to execute illegal SQL commands

Trust: 2.34

sources: NVD: CVE-2020-5920 // JVNDB: JVNDB-2020-010317 // CNVD: CNVD-2020-50519 // VULHUB: VHN-184045 // VULMON: CVE-2020-5920

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-50519

AFFECTED PRODUCTS

vendor:f5model:big-ip advanced firewall managerscope:lteversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:11.6.1

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:14.1.2

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:12.1.5.2

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:11.6.5.2

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:11.6.1 から 11.6.5.1

Trust: 0.8

vendor:f5model:big-ip advanced firewall managerscope:eqversion:12.1.0 から 12.1.5.1

Trust: 0.8

vendor:f5model:big-ip advanced firewall managerscope:eqversion:13.1.0 から 13.1.3.4

Trust: 0.8

vendor:f5model:big-ip advanced firewall managerscope:eqversion:14.1.0 から 14.1.2.7

Trust: 0.8

vendor:f5model:big-ip advanced firewall managerscope:eqversion:15.0.0 から 15.1.0.5

Trust: 0.8

vendor:f5model:big-ip afmscope:gteversion:15.0.0,<=15.1.0.5

Trust: 0.6

vendor:f5model:big-ip afmscope:gteversion:14.1.0,<=14.1.2.7

Trust: 0.6

vendor:f5model:big-ip afmscope:gteversion:13.1.0,<=13.1.3.4

Trust: 0.6

vendor:f5model:big-ip afmscope:gteversion:12.1.0,<=12.1.5.1

Trust: 0.6

vendor:f5model:big-ip afmscope:gteversion:11.6.1,<=11.6.5.1

Trust: 0.6

sources: CNVD: CNVD-2020-50519 // JVNDB: JVNDB-2020-010317 // NVD: CVE-2020-5920

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-5920
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2020-010317
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2020-50519
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202008-1238
value: MEDIUM

Trust: 0.6

VULHUB: VHN-184045
value: MEDIUM

Trust: 0.1

VULMON: CVE-2020-5920
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-5920
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: JVNDB-2020-010317
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-50519
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-184045
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-5920
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-010317
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-50519 // VULHUB: VHN-184045 // VULMON: CVE-2020-5920 // JVNDB: JVNDB-2020-010317 // CNNVD: CNNVD-202008-1238 // NVD: CVE-2020-5920

PROBLEMTYPE DATA

problemtype:CWE-89

Trust: 1.9

sources: VULHUB: VHN-184045 // JVNDB: JVNDB-2020-010317 // NVD: CVE-2020-5920

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202008-1238

TYPE

SQL injection

Trust: 0.6

sources: CNNVD: CNNVD-202008-1238

CONFIGURATIONS

[
  {
    "CVE_data_version": "4.0",
    "nodes": [
      {
        "operator": "OR",
        "cpe_match": [
          {
            "vulnerable": true,
            "cpe22Uri": "cpe:/a:f5:big-ip_advanced_firewall_manager"
          }
        ]
      }
    ]
  }
]

sources: JVNDB: JVNDB-2020-010317

PATCH

title:K25160703url:https://support.f5.com/csp/article/K25160703

Trust: 0.8

title:Patch for SQL injection vulnerability in F5 BIG-IP AFM configuration toolurl:https://www.cnvd.org.cn/patchInfo/show/233008

Trust: 0.6

title:BIG-IP Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=127497

Trust: 0.6

title: - url:https://github.com/afine-com/research

Trust: 0.1

title:researchurl:https://github.com/afinepl/research

Trust: 0.1

sources: CNVD: CNVD-2020-50519 // VULMON: CVE-2020-5920 // JVNDB: JVNDB-2020-010317 // CNNVD: CNNVD-202008-1238

EXTERNAL IDS

db:NVDid:CVE-2020-5920

Trust: 3.2

db:JVNDBid:JVNDB-2020-010317

Trust: 0.8

db:CNVDid:CNVD-2020-50519

Trust: 0.7

db:CNNVDid:CNNVD-202008-1238

Trust: 0.7

db:AUSCERTid:ESB-2020.2923

Trust: 0.6

db:VULHUBid:VHN-184045

Trust: 0.1

db:VULMONid:CVE-2020-5920

Trust: 0.1

sources: CNVD: CNVD-2020-50519 // VULHUB: VHN-184045 // VULMON: CVE-2020-5920 // JVNDB: JVNDB-2020-010317 // CNNVD: CNNVD-202008-1238 // NVD: CVE-2020-5920

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2020-5920

Trust: 2.0

url:https://support.f5.com/csp/article/k25160703

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-5920

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.2923/

Trust: 0.6

url:https://vigilance.fr/vulnerability/f5-big-ip-afm-sql-injection-via-configuration-utility-33153

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/89.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/afine-com/research

Trust: 0.1

url:https://github.com/afinepl/research

Trust: 0.1

sources: CNVD: CNVD-2020-50519 // VULHUB: VHN-184045 // VULMON: CVE-2020-5920 // JVNDB: JVNDB-2020-010317 // CNNVD: CNNVD-202008-1238 // NVD: CVE-2020-5920

SOURCES

db:CNVDid:CNVD-2020-50519
db:VULHUBid:VHN-184045
db:VULMONid:CVE-2020-5920
db:JVNDBid:JVNDB-2020-010317
db:CNNVDid:CNNVD-202008-1238
db:NVDid:CVE-2020-5920

LAST UPDATE DATE

2024-11-23T22:47:52.950000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-50519date:2020-09-05T00:00:00
db:VULHUBid:VHN-184045date:2020-09-02T00:00:00
db:VULMONid:CVE-2020-5920date:2020-09-02T00:00:00
db:JVNDBid:JVNDB-2020-010317date:2021-01-06T07:11:59
db:CNNVDid:CNNVD-202008-1238date:2020-10-22T00:00:00
db:NVDid:CVE-2020-5920date:2024-11-21T05:34:49.797

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-50519date:2020-09-04T00:00:00
db:VULHUBid:VHN-184045date:2020-08-26T00:00:00
db:VULMONid:CVE-2020-5920date:2020-08-26T00:00:00
db:JVNDBid:JVNDB-2020-010317date:2021-01-06T07:11:59
db:CNNVDid:CNNVD-202008-1238date:2020-08-26T00:00:00
db:NVDid:CVE-2020-5920date:2020-08-26T15:15:13.413