CVE-2023-43746 - Privilege Defined With Unsafe Actions

Severity

86%

Complexity

23%

Confidentiality

96%

When running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing BIG-IP external monitor on a BIG-IP system.  A successful exploit can allow the attacker to cross a security boundary.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS 3.1 Base Score 8.7. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N).

Demo Examples

Privilege Defined With Unsafe Actions

CWE-267

This code intends to allow only Administrators to print debug information about a system.


               
}
ADMIN,USER,GUEST
}
}
break;
break;
System.out.println("You must be logged in to perform this command");

While the intention was to only allow Administrators to print the debug information, the code as written only excludes those the with the role of "GUEST". Someone with the role of "ADMIN" or "USER" will be allowed access, which goes against the original intent. An attacker may be able to use this debug information to craft an attack on the system.

Overview

Type

F5

First reported 1 year ago

2023-10-10 13:15:00

Last updated 1 year ago

2023-11-02 01:38:00

Affected Software

F5 Big-IP Access Policy Manager (APM)

F5 Big-IP Advanced Firewall Manager (AFM)

F5 Big-IP Application Security Manager (ASM)

F5 Big-IP Domain Name System (DNS)

F5 Networks Big-IP Local Traffic Manager (LTM)

F5 Big-IP Analytics

F5 Big-IP Application Acceleration Manager (AAM)

F5 Big-IP Fraud Protection Service (FPS)

F5 Big-IP Global Traffic Manager (GTM)

F5 Big-IP Link Controller

F5 Big-IP Policy Enforcement Manager (PEM)

F5 Big-IP WebAccelerator

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.