Unknown
CVE-2015-8021
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Incomplete blacklist vulnerability in the Configuration utility in F5 BIG-IP LTM, Analytics, APM, ASM, GTM, Link Controller, and PSM 11.x before 11.2.1 HF11, 11.3.x, 11.4.0 before HF8, and 11.4.1 before HF6; BIG-IP AAM 11.4.0 before HF8 and 11.4.1 before HF6; BIG-IP AFM and PEM 11.3.x, 11.4.0 before HF8, and 11.4.1 before HF6; and BIG-IP Edge Gateway, WebAccelerator, and WOM 11.x before 11.2.1 HF11 and 11.3.0 allows remote authenticated users to upload files via uploadImage.php.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- big-ip access policy manager 11.0.0,
- big-ip access policy manager 11.1.0,
- big-ip access policy manager 11.2.0,
- big-ip access policy manager 11.2.1,
- big-ip access policy manager 11.3.0,
- big-ip access policy manager 11.4.0,
- big-ip access policy manager 11.4.1,
- big-ip advanced firewall manager 11.3.0,
- big-ip advanced firewall manager 11.4.0,
- big-ip advanced firewall manager 11.4.1,
- big-ip analytics 11.0.0,
- big-ip analytics 11.1.0,
- big-ip analytics 11.2.0,
- big-ip analytics 11.2.1,
- big-ip analytics 11.3.0,
- big-ip analytics 11.4.0,
- big-ip analytics 11.4.1,
- big-ip application acceleration manager 11.4.0,
- big-ip application acceleration manager 11.4.1,
- big-ip application security manager 11.0.0,
- big-ip application security manager 11.1.0,
- big-ip application security manager 11.2.0,
- big-ip application security manager 11.2.1,
- big-ip application security manager 11.3.0,
- big-ip application security manager 11.4.0,
- big-ip application security manager 11.4.1,
- big-ip edge gateway 11.0.0,
- big-ip edge gateway 11.1.0,
- big-ip edge gateway 11.2.0,
- big-ip edge gateway 11.2.1,
- big-ip edge gateway 11.3.0,
- big-ip global traffic manager 11.0.0,
- big-ip global traffic manager 11.1.0,
- big-ip global traffic manager 11.2.0,
- big-ip global traffic manager 11.2.1,
- big-ip global traffic manager 11.3.0,
- big-ip global traffic manager 11.4.0,
- big-ip link controller 11.0.0,
- big-ip link controller 11.1.0,
- big-ip link controller 11.2.0,
- big-ip link controller 11.2.1,
- big-ip link controller 11.3.0,
- big-ip link controller 11.4.0,
- big-ip link controller 11.4.1,
- big-ip local traffic manager 11.0.0,
- big-ip local traffic manager 11.1.0,
- big-ip local traffic manager 11.2.0,
- big-ip local traffic manager 11.2.1,
- big-ip local traffic manager 11.3.0,
- big-ip local traffic manager 11.4.0,
- big-ip local traffic manager 11.4.1,
- big-ip policy enforcement manager 11.3.0,
- big-ip policy enforcement manager 11.4.0,
- big-ip policy enforcement manager 11.4.1,
- big-ip protocol security module 11.0.0,
- big-ip protocol security module 11.1.0,
- big-ip protocol security module 11.2.0,
- big-ip protocol security module 11.2.1,
- big-ip protocol security module 11.3.0,
- big-ip protocol security module 11.4.0,
- big-ip protocol security module 11.4.1,
- big-ip wan optimization manager 11.0.0,
- big-ip wan optimization manager 11.1.0,
- big-ip wan optimization manager 11.2.0,
- big-ip wan optimization manager 11.2.1,
- big-ip wan optimization manager 11.3.0,
- big-ip webaccelerator 11.0.0,
- big-ip webaccelerator 11.1.0,
- big-ip webaccelerator 11.2.0,
- big-ip webaccelerator 11.2.1,
- big-ip webaccelerator 11.3.0
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: