Files
CVEs-PoC/2021/CVE-2021-22992.md
T
2024-05-25 21:48:12 +02:00

20 lines
1.1 KiB
Markdown

### [CVE-2021-22992](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22992)
![](https://img.shields.io/static/v1?label=Product&message=BIG-IP%20Advanced%20WAF%20and%20BIG-IP%20ASM&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=RCE&color=brighgreen)
### Description
On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, a malicious HTTP response to an Advanced WAF/BIG-IP ASM virtual server with Login Page configured in its policy may trigger a buffer overflow, resulting in a DoS attack. In certain situations, it may allow remote code execution (RCE), leading to complete system compromise. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/DNTYO/F5_Vulnerability
- https://github.com/r0eXpeR/supplier