All the vulnerabilites related to F5 - BIG-IP Guided Configuration (GC)
cve-2022-27878
Vulnerability from cvelistv5
Published
2022-05-05 16:31
Modified
2024-09-16 23:45
Severity ?
EPSS score ?
Summary
On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP, and F5 BIG-IP Guided Configuration (GC) all versions prior to 9.0, a stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to execute JavaScript in the context of the currently logged-in user. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
References
▼ | URL | Tags |
---|---|---|
https://support.f5.com/csp/article/K92807525 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
F5 | BIG-IP | |
F5 | BIG-IP Guided Configuration (GC) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:41:10.197Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.f5.com/csp/article/K92807525" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "BIG-IP", "vendor": "F5", "versions": [ { "status": "affected", "version": "16.1.x" }, { "status": "affected", "version": "15.1.x" }, { "status": "affected", "version": "14.1.x" }, { "status": "affected", "version": "13.1.x" }, { "status": "affected", "version": "12.1.x" }, { "status": "affected", "version": "11.6.x" }, { "lessThan": "17.0.x*", "status": "unaffected", "version": "17.0.0", "versionType": "custom" } ] }, { "product": "BIG-IP Guided Configuration (GC)", "vendor": "F5", "versions": [ { "lessThan": "9.0", "status": "affected", "version": "All", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "This issue was reported to F5 by a source that chooses to remain anonymous." } ], "datePublic": "2022-05-04T00:00:00", "descriptions": [ { "lang": "en", "value": "On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP, and F5 BIG-IP Guided Configuration (GC) all versions prior to 9.0, a stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to execute JavaScript in the context of the currently logged-in user. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-05T16:31:45", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.f5.com/csp/article/K92807525" } ], "source": { "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-05-04T14:00:00.000Z", "ID": "CVE-2022-27878", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BIG-IP", "version": { "version_data": [ { "version_affected": "!\u003e=", "version_name": "17.0.x", "version_value": "17.0.0" }, { "version_affected": "=", "version_name": "16.1.x", "version_value": "16.1.x" }, { "version_affected": "=", "version_name": "15.1.x", "version_value": "15.1.x" }, { "version_affected": "=", "version_name": "14.1.x", "version_value": "14.1.x" }, { "version_affected": "=", "version_name": "13.1.x", "version_value": "13.1.x" }, { "version_affected": "=", "version_name": "12.1.x", "version_value": "12.1.x" }, { "version_affected": "=", "version_name": "11.6.x", "version_value": "11.6.x" } ] } }, { "product_name": "BIG-IP Guided Configuration (GC)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "All", "version_value": "9.0" } ] } } ] }, "vendor_name": "F5" } ] } }, "credit": [ { "lang": "eng", "value": "This issue was reported to F5 by a source that chooses to remain anonymous." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP, and F5 BIG-IP Guided Configuration (GC) all versions prior to 9.0, a stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to execute JavaScript in the context of the currently logged-in user. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.f5.com/csp/article/K92807525", "refsource": "MISC", "url": "https://support.f5.com/csp/article/K92807525" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2022-27878", "datePublished": "2022-05-05T16:31:45.750227Z", "dateReserved": "2022-04-19T00:00:00", "dateUpdated": "2024-09-16T23:45:27.420Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-25946
Vulnerability from cvelistv5
Published
2022-05-05 16:21
Modified
2024-09-17 03:28
Severity ?
EPSS score ?
Summary
On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP Advanced WAF, ASM, and ASM, and F5 BIG-IP Guided Configuration (GC) all versions prior to 9.0, when running in Appliance mode, an authenticated attacker with Administrator role privilege may be able to bypass Appliance mode restrictions due to a missing integrity check in F5 BIG-IP Guided Configuration. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
References
▼ | URL | Tags |
---|---|---|
https://support.f5.com/csp/article/K52322100 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:49:44.326Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.f5.com/csp/article/K52322100" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "BIG-IP (Advanced WAF, APM, ASM)", "vendor": "F5", "versions": [ { "status": "affected", "version": "16.1.x" }, { "status": "affected", "version": "15.1.x" }, { "status": "affected", "version": "14.1.x" }, { "status": "affected", "version": "13.1.x" }, { "status": "affected", "version": "12.1.x" }, { "status": "affected", "version": "11.6.x" }, { "lessThan": "17.0.x*", "status": "unaffected", "version": "17.0.0", "versionType": "custom" } ] }, { "product": "BIG-IP Guided Configuration (GC)", "vendor": "F5", "versions": [ { "lessThan": "9.0", "status": "affected", "version": "All", "versionType": "custom" } ] } ], "datePublic": "2022-05-04T00:00:00", "descriptions": [ { "lang": "en", "value": "On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP Advanced WAF, ASM, and ASM, and F5 BIG-IP Guided Configuration (GC) all versions prior to 9.0, when running in Appliance mode, an authenticated attacker with Administrator role privilege may be able to bypass Appliance mode restrictions due to a missing integrity check in F5 BIG-IP Guided Configuration. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-354", "description": "CWE-354 Improper Validation of Integrity Check Value", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-05T16:21:26", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.f5.com/csp/article/K52322100" } ], "source": { "discovery": "INTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-05-04T14:00:00.000Z", "ID": "CVE-2022-25946", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BIG-IP (Advanced WAF, APM, ASM)", "version": { "version_data": [ { "version_affected": "!\u003e=", "version_name": "17.0.x", "version_value": "17.0.0" }, { "version_affected": "=", "version_name": "16.1.x", "version_value": "16.1.x" }, { "version_affected": "=", "version_name": "15.1.x", "version_value": "15.1.x" }, { "version_affected": "=", "version_name": "14.1.x", "version_value": "14.1.x" }, { "version_affected": "=", "version_name": "13.1.x", "version_value": "13.1.x" }, { "version_affected": "=", "version_name": "12.1.x", "version_value": "12.1.x" }, { "version_affected": "=", "version_name": "11.6.x", "version_value": "11.6.x" } ] } }, { "product_name": "BIG-IP Guided Configuration (GC)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "All", "version_value": "9.0" } ] } } ] }, "vendor_name": "F5" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP Advanced WAF, ASM, and ASM, and F5 BIG-IP Guided Configuration (GC) all versions prior to 9.0, when running in Appliance mode, an authenticated attacker with Administrator role privilege may be able to bypass Appliance mode restrictions due to a missing integrity check in F5 BIG-IP Guided Configuration. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-354 Improper Validation of Integrity Check Value" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.f5.com/csp/article/K52322100", "refsource": "MISC", "url": "https://support.f5.com/csp/article/K52322100" } ] }, "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2022-25946", "datePublished": "2022-05-05T16:21:26.941651Z", "dateReserved": "2022-04-19T00:00:00", "dateUpdated": "2024-09-17T03:28:41.853Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27806
Vulnerability from cvelistv5
Published
2022-05-05 16:29
Modified
2024-09-17 01:36
Severity ?
EPSS score ?
Summary
On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP Advanced WAF, ASM, and ASM, and F5 BIG-IP Guided Configuration (GC) all versions prior to 9.0, when running in Appliance mode, an authenticated attacker assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing command injection vulnerabilities in undisclosed URIs in F5 BIG-IP Guided Configuration. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
References
▼ | URL | Tags |
---|---|---|
https://support.f5.com/csp/article/K68647001 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.f5.com/csp/article/K68647001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "BIG-IP (Advanced WAF, APM, ASM)", "vendor": "F5", "versions": [ { "status": "affected", "version": "16.1.x" }, { "status": "affected", "version": "15.1.x" }, { "status": "affected", "version": "14.1.x" }, { "status": "affected", "version": "13.1.x" }, { "status": "affected", "version": "12.1.x" }, { "status": "affected", "version": "11.6.x" }, { "lessThan": "17.0.x*", "status": "unaffected", "version": "17.0.0", "versionType": "custom" } ] }, { "product": "BIG-IP Guided Configuration (GC)", "vendor": "F5", "versions": [ { "lessThan": "9.0", "status": "affected", "version": "All", "versionType": "custom" } ] } ], "datePublic": "2022-05-04T00:00:00", "descriptions": [ { "lang": "en", "value": "On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP Advanced WAF, ASM, and ASM, and F5 BIG-IP Guided Configuration (GC) all versions prior to 9.0, when running in Appliance mode, an authenticated attacker assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing command injection vulnerabilities in undisclosed URIs in F5 BIG-IP Guided Configuration. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-05T16:29:58", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.f5.com/csp/article/K68647001" } ], "source": { "discovery": "INTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-05-04T14:00:00.000Z", "ID": "CVE-2022-27806", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BIG-IP (Advanced WAF, APM, ASM)", "version": { "version_data": [ { "version_affected": "!\u003e=", "version_name": "17.0.x", "version_value": "17.0.0" }, { "version_affected": "=", "version_name": "16.1.x", "version_value": "16.1.x" }, { "version_affected": "=", "version_name": "15.1.x", "version_value": "15.1.x" }, { "version_affected": "=", "version_name": "14.1.x", "version_value": "14.1.x" }, { "version_affected": "=", "version_name": "13.1.x", "version_value": "13.1.x" }, { "version_affected": "=", "version_name": "12.1.x", "version_value": "12.1.x" }, { "version_affected": "=", "version_name": "11.6.x", "version_value": "11.6.x" } ] } }, { "product_name": "BIG-IP Guided Configuration (GC)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "All", "version_value": "9.0" } ] } } ] }, "vendor_name": "F5" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP Advanced WAF, ASM, and ASM, and F5 BIG-IP Guided Configuration (GC) all versions prior to 9.0, when running in Appliance mode, an authenticated attacker assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing command injection vulnerabilities in undisclosed URIs in F5 BIG-IP Guided Configuration. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.f5.com/csp/article/K68647001", "refsource": "MISC", "url": "https://support.f5.com/csp/article/K68647001" } ] }, "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2022-27806", "datePublished": "2022-05-05T16:29:58.078244Z", "dateReserved": "2022-04-19T00:00:00", "dateUpdated": "2024-09-17T01:36:21.373Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27230
Vulnerability from cvelistv5
Published
2022-05-05 16:09
Modified
2024-09-17 01:15
Severity ?
EPSS score ?
Summary
On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP APM, and F5 BIG-IP Guided Configuration (GC) all versions prior to 9.0, a reflected cross-site scripting (XSS) vulnerability exists in an undisclosed page of F5 BIG-IP Guided Configuration that allows an attacker to execute JavaScript in the context of the currently logged-in user. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
References
▼ | URL | Tags |
---|---|---|
https://support.f5.com/csp/article/K21317311 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
F5 | BIG-IP APM | |
F5 | BIG-IP Guided Configuration (GC) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:25:32.659Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.f5.com/csp/article/K21317311" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "BIG-IP APM", "vendor": "F5", "versions": [ { "status": "affected", "version": "16.1.x" }, { "status": "affected", "version": "15.1.x" }, { "status": "affected", "version": "14.1.x" }, { "status": "affected", "version": "13.1.x" }, { "status": "affected", "version": "12.1.x" }, { "status": "affected", "version": "11.6.x" }, { "lessThan": "17.0.x*", "status": "unaffected", "version": "17.0.0", "versionType": "custom" } ] }, { "product": "BIG-IP Guided Configuration (GC)", "vendor": "F5", "versions": [ { "lessThan": "9.0", "status": "affected", "version": "All", "versionType": "custom" } ] } ], "datePublic": "2022-05-04T00:00:00", "descriptions": [ { "lang": "en", "value": "On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP APM, and F5 BIG-IP Guided Configuration (GC) all versions prior to 9.0, a reflected cross-site scripting (XSS) vulnerability exists in an undisclosed page of F5 BIG-IP Guided Configuration that allows an attacker to execute JavaScript in the context of the currently logged-in user. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-05T16:09:59", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.f5.com/csp/article/K21317311" } ], "source": { "discovery": "INTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-05-04T14:00:00.000Z", "ID": "CVE-2022-27230", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BIG-IP APM", "version": { "version_data": [ { "version_affected": "!\u003e=", "version_name": "17.0.x", "version_value": "17.0.0" }, { "version_affected": "=", "version_name": "16.1.x", "version_value": "16.1.x" }, { "version_affected": "=", "version_name": "15.1.x", "version_value": "15.1.x" }, { "version_affected": "=", "version_name": "14.1.x", "version_value": "14.1.x" }, { "version_affected": "=", "version_name": "13.1.x", "version_value": "13.1.x" }, { "version_affected": "=", "version_name": "12.1.x", "version_value": "12.1.x" }, { "version_affected": "=", "version_name": "11.6.x", "version_value": "11.6.x" } ] } }, { "product_name": "BIG-IP Guided Configuration (GC)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "All", "version_value": "9.0" } ] } } ] }, "vendor_name": "F5" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP APM, and F5 BIG-IP Guided Configuration (GC) all versions prior to 9.0, a reflected cross-site scripting (XSS) vulnerability exists in an undisclosed page of F5 BIG-IP Guided Configuration that allows an attacker to execute JavaScript in the context of the currently logged-in user. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.f5.com/csp/article/K21317311", "refsource": "MISC", "url": "https://support.f5.com/csp/article/K21317311" } ] }, "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2022-27230", "datePublished": "2022-05-05T16:09:59.156080Z", "dateReserved": "2022-04-19T00:00:00", "dateUpdated": "2024-09-17T01:15:51.928Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }