Applies To:

Show Versions Show Versions

sol14154: SQL injection vulnerability from an authenticated source CVE-2012-3000
Security AdvisorySecurity Advisory

Original Publication Date: 01/23/2013
Updated Date: 07/25/2016

Vulnerability Description

An SQL injection vulnerability exists in a BIG-IP component. This local vulnerability may allow an authenticated attacker to download arbitrary files from the file system.
 

Impact

An attacker may be able to exploit the vulnerability and retrieve arbitrary files or modify database contents.

F5 Product Development has assigned ID 400060 to this vulnerability. To find out whether F5 has determined that your release is vulnerable, and to obtain information about releases or hotfixes that resolve the vulnerability, refer to the following table:

ProductVersions known
to be vulnerable
Versions known
to be not vulnerable
Vulnerable component
or feature
BIG-IP LTM11.0.0 - 11.2.1
 
9.4.6 - 9.4.8
10.0.1 - 10.2.4
11.2.0 HF3
11.2.1 HF3
11.3.0 - 11.4.0
APM WebGUI
BIG-IP GTM11.0.0 - 11.2.19.4.6 - 9.4.8
10.0.1 - 10.2.4
11.2.0 HF3
11.2.1 HF3
11.3.0 - 11.4.0
APM WebGUI
BIG-IP ASM11.0.0 - 11.2.19.4.6 - 9.4.8
10.0.1 - 10.2.4
11.2.0 HF3
11.2.1 HF3
11.3.0 - 11.4.0
APM WebGUI
BIG-IP Link Controller11.0.0 - 11.2.19.4.6 - 9.4.8
10.0.1 - 10.2.4
11.2.0 HF3
11.2.1 HF3
11.3.0 - 11.4.0
APM WebGUI
BIG-IP WebAccelerator11.0.0 - 11.2.19.4.6 - 9.4.8
10.0.1 - 10.2.4
11.2.0 HF3
11.2.1 HF3
11.3.0
AVR WebGUI
BIG-IP PSM11.0.0 - 11.2.19.4.6 - 9.4.8
10.0.1 - 10.2.4
11.2.0 HF3
11.2.1 HF3
11.3.0 - 11.4.0
APM WebGUI
BIG-IP WOM11.0.0 - 11.2.110.0.1 - 10.2.4
11.2.0 HF3
11.2.1 HF3
11.3.0
AVR WebGUI
BIG-IP APM11.0.0 - 11.2.110.0.1 - 10.2.4
11.2.0 HF3
11.2.1 HF3
11.3.0 - 11.4.0
APM WebGUI
BIG-IP Edge Gateway11.0.0 - 11.2.110.0.1 - 10.2.4
11.2.0 HF3
11.2.1 HF3
11.3.0 - 11.4.0
APM WebGUI
BIG-IP Analytics11.0.0 - 11.2.111.2.0 HF3
11.2.1 HF3
11.3.0 - 11.4.0
APM WebGUI
BIG-IP AFMNone11.3.0 - 11.4.0None
BIG-IP PEMNone11.3.0 - 11.4.0None
BIG-IP AAMNone11.4.0None
FirePassNone6.1.0
7.0.0
None
Enterprise ManagerNone1.x
2.x
3.x
None
ARXNone4.x
5.x
6.x
None

Vulnerability Recommended Actions

To eliminate this vulnerability, upgrade to a version that is listed in the Versions known to be not vulnerable column.

Acknowledgements

F5 would like to acknowledge SEC Consult Vulnerability Lab for bringing this issue to our attention, and for following the highest standards of responsible disclosure.

Supplemental Information

Was this resource helpful in solving your issue?




NOTE: Please do not provide personal information.



Incorrect answer. Please try again: Please enter the words to the right: Please enter the numbers you hear:

Additional Comments (optional)