On F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.2, or 11.2.1-11.6.3.1, Enterprise Manager 3.1.1, BIG-IQ Centralized Management 5.0.0-5.4.0 or 4.6.0, BIG-IQ Cloud and Orchestration 1.0.0, or F5 iWorkflow 2.0.2-2.3.0, authenticated users granted TMOS Shell (tmsh) access can access objects on the file system which would normally be disallowed by tmsh restrictions. This allows for authenticated, low privileged attackers to exfiltrate objects on the file system which should not be allowed.
References
Link | Resource |
---|---|
http://www.securitytracker.com/id/1040799 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040800 | Third Party Advisory VDB Entry |
https://support.f5.com/csp/article/K37442533 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: f5
Published: 2018-04-30T00:00:00
Updated: 2018-05-03T09:57:01
Reserved: 2018-01-12T00:00:00
Link: CVE-2018-5516
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-05-02T13:29:00.617
Modified: 2019-10-03T00:03:26.223
Link: CVE-2018-5516
JSON object: View
Redhat Information
No data.
CWE