ID CVE-2018-15335
Summary When APM 13.0.0-13.1.x is deployed as an OAuth Resource Server, APM becomes a client application to an external OAuth authorization server. In certain cases when communication between the BIG-IP APM and the OAuth authorization server is lost, APM may not display the intended message in the failure response
References
Vulnerable Configurations
  • cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf1:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf1:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf2:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf2:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf3:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf3:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.1:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 03-10-2019 - 00:03)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:N/A:N
refmap via4
bid 106355
confirm https://support.f5.com/csp/article/K27617652
Last major update 03-10-2019 - 00:03
Published 28-12-2018 - 15:29
Last modified 03-10-2019 - 00:03
Back to Top