fkie_cve-2024-33604
Vulnerability from fkie_nvd
Published
2024-05-08 15:15
Modified
2025-10-21 11:38
Summary
A reflected cross-site scripting (XSS) vulnerability exist in undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Impacted products
Vendor Product Version
f5 big-ip_access_policy_manager *
f5 big-ip_advanced_firewall_manager *
f5 big-ip_advanced_web_application_firewall *
f5 big-ip_analytics *
f5 big-ip_application_acceleration_manager *
f5 big-ip_application_security_manager *
f5 big-ip_application_visibility_and_reporting *
f5 big-ip_automation_toolchain *
f5 big-ip_carrier-grade_nat *
f5 big-ip_container_ingress_services *
f5 big-ip_ddos_hybrid_defender *
f5 big-ip_domain_name_system *
f5 big-ip_edge_gateway *
f5 big-ip_fraud_protection_service *
f5 big-ip_global_traffic_manager *
f5 big-ip_link_controller *
f5 big-ip_local_traffic_manager *
f5 big-ip_policy_enforcement_manager *
f5 big-ip_ssl_orchestrator *
f5 big-ip_webaccelerator *
f5 big-ip_websafe *
f5 big-ip_access_policy_manager *
f5 big-ip_advanced_firewall_manager *
f5 big-ip_advanced_web_application_firewall *
f5 big-ip_analytics *
f5 big-ip_application_acceleration_manager *
f5 big-ip_application_security_manager *
f5 big-ip_application_visibility_and_reporting *
f5 big-ip_automation_toolchain *
f5 big-ip_carrier-grade_nat *
f5 big-ip_container_ingress_services *
f5 big-ip_ddos_hybrid_defender *
f5 big-ip_domain_name_system *
f5 big-ip_edge_gateway *
f5 big-ip_fraud_protection_service *
f5 big-ip_global_traffic_manager *
f5 big-ip_link_controller *
f5 big-ip_local_traffic_manager *
f5 big-ip_policy_enforcement_manager *
f5 big-ip_ssl_orchestrator *
f5 big-ip_webaccelerator *
f5 big-ip_websafe *
f5 big-ip_access_policy_manager *
f5 big-ip_advanced_firewall_manager *
f5 big-ip_advanced_web_application_firewall *
f5 big-ip_analytics *
f5 big-ip_application_acceleration_manager *
f5 big-ip_application_security_manager *
f5 big-ip_application_visibility_and_reporting *
f5 big-ip_automation_toolchain *
f5 big-ip_carrier-grade_nat *
f5 big-ip_container_ingress_services *
f5 big-ip_ddos_hybrid_defender *
f5 big-ip_domain_name_system *
f5 big-ip_edge_gateway *
f5 big-ip_fraud_protection_service *
f5 big-ip_global_traffic_manager *
f5 big-ip_link_controller *
f5 big-ip_local_traffic_manager *
f5 big-ip_policy_enforcement_manager *
f5 big-ip_ssl_orchestrator *
f5 big-ip_webaccelerator *
f5 big-ip_websafe *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CACA2A6-08AF-4D21-BC54-94C6CE02B9B1",
              "versionEndExcluding": "15.1.10.4",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7C2CA5C-44F4-4AC0-B2A0-35B944BD5C4A",
              "versionEndExcluding": "15.1.10.4",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A142D60A-5714-4B46-858F-D6B50B772A83",
              "versionEndExcluding": "15.1.10.4",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "972EA8CF-2069-4E8B-94FD-9CE58A93A85A",
              "versionEndExcluding": "15.1.10.4",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDCE0B47-A4F8-4322-AFF6-E4024366D694",
              "versionEndExcluding": "15.1.10.4",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAC6A1D8-0003-466D-8EB1-DA2850A8D3B3",
              "versionEndExcluding": "15.1.10.4",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D05410D9-00DE-4C62-AD72-EF90EC92A728",
              "versionEndExcluding": "15.1.10.4",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_automation_toolchain:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "554588E7-4E76-431A-AD9E-93141FB745FD",
              "versionEndExcluding": "15.1.10.4",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C500C68-DB59-48B7-87B5-1FF172F90A2A",
              "versionEndExcluding": "15.1.10.4",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_container_ingress_services:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55CE6DC1-2E40-47C1-91FA-94AD265E528E",
              "versionEndExcluding": "15.1.10.4",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEF71C33-E6E1-4AD5-8799-13BE1131A107",
              "versionEndExcluding": "15.1.10.4",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEA31127-5A97-4E55-8FAE-59DD1D45F1E7",
              "versionEndExcluding": "15.1.10.4",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C99E756-0AB5-42EA-8C99-FC8D61991A38",
              "versionEndExcluding": "15.1.10.4",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB70E168-EC62-4419-B480-5B45DDF38B1E",
              "versionEndExcluding": "15.1.10.4",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA10011-8864-43CC-A8B2-F9E9D0A2C63C",
              "versionEndExcluding": "15.1.10.4",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD9A0877-DF16-48AC-99B6-A8010D695775",
              "versionEndExcluding": "15.1.10.4",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A2DAA94-08D7-43B3-B2F5-BE2BDA7A7B50",
              "versionEndExcluding": "15.1.10.4",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FB01B67-0CEB-4C0F-9B36-2F61F10EE037",
              "versionEndExcluding": "15.1.10.4",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA193A33-4552-49A0-8586-780574DB143D",
              "versionEndExcluding": "15.1.10.4",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "64A8EE33-D780-4EB8-991A-AD4A17099219",
              "versionEndExcluding": "15.1.10.4",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D0496E6-E042-421F-8F7E-729315C69E60",
              "versionEndExcluding": "15.1.10.4",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "196A110F-C8BC-4211-A54B-D1A5FF6F7AA9",
              "versionEndExcluding": "16.1.4.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F893B25-720D-4056-9B0C-316BFA6AB661",
              "versionEndExcluding": "16.1.4.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E8DC818-CADC-459A-9314-B0E59BED9FB6",
              "versionEndExcluding": "16.1.4.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DDF3DFB-E024-4F27-8D06-A4D7EF15FC86",
              "versionEndExcluding": "16.1.4.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A4E7CF-5966-460D-9140-965B0CED780D",
              "versionEndExcluding": "16.1.4.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0035198C-077A-4D29-9677-86CCAB9B9BC9",
              "versionEndExcluding": "16.1.4.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0043C3FF-FFB3-4B6E-9BFE-EBD7CD34DDD0",
              "versionEndExcluding": "16.1.4.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_automation_toolchain:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "024D694F-DC74-42E3-B72C-0604FF2BE043",
              "versionEndExcluding": "16.1.4.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473D586-E7BC-4145-A63B-7554707118C8",
              "versionEndExcluding": "16.1.4.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_container_ingress_services:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A74851-27FA-4C39-91CC-02A0DD30573C",
              "versionEndExcluding": "16.1.4.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB429C0B-C83E-4A57-8257-CDD3DBC80B9F",
              "versionEndExcluding": "16.1.4.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB244C88-EBED-4FD6-B1C3-121160A11E13",
              "versionEndExcluding": "16.1.4.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F12F153-8A1D-48C5-BFC1-66892DD8F94F",
              "versionEndExcluding": "16.1.4.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C42930EC-BA18-4C77-A0CD-7616885D2F98",
              "versionEndExcluding": "16.1.4.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E75C04C-5283-4A4A-9157-64FD1C8CAEAC",
              "versionEndExcluding": "16.1.4.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AE18EB2-34E6-4732-ADED-1BCCF5123EDC",
              "versionEndExcluding": "16.1.4.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C68F861-D33E-4A94-B712-B62CF37F98F3",
              "versionEndExcluding": "16.1.4.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E76D41-7E59-4144-A88B-5CC199D4ED55",
              "versionEndExcluding": "16.1.4.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8BE669-448D-45D9-BA7C-78683206BDAC",
              "versionEndExcluding": "16.1.4.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC89716A-6548-4382-AE37-4F0B40042F5F",
              "versionEndExcluding": "16.1.4.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "285876DC-FA00-4310-9B58-31865C49C5C2",
              "versionEndExcluding": "16.1.4.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3F56C7B-1525-427A-8389-B573614E6146",
              "versionEndExcluding": "17.1.1.3",
              "versionStartIncluding": "17.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "726CA9BF-0786-4A99-932D-F40FFC883CF7",
              "versionEndExcluding": "17.1.1.3",
              "versionStartIncluding": "17.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D77A0BE9-BAD3-4079-9C18-26205BF693F4",
              "versionEndExcluding": "17.1.1.3",
              "versionStartIncluding": "17.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D906A7C4-8A91-4E95-B9DC-11F10C9784A3",
              "versionEndExcluding": "17.1.1.3",
              "versionStartIncluding": "17.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9B19749-8B14-4EC5-AFCA-6A4BD15E3E65",
              "versionEndExcluding": "17.1.1.3",
              "versionStartIncluding": "17.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C72C61-7499-436D-B0E8-BBCCA6DC0D13",
              "versionEndExcluding": "17.1.1.3",
              "versionStartIncluding": "17.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "09D4DD72-BD2D-4CEC-85DB-B57330D4FCD1",
              "versionEndExcluding": "17.1.1.3",
              "versionStartIncluding": "17.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_automation_toolchain:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC3C02FF-4B83-443B-8B49-2D77EA76B542",
              "versionEndExcluding": "17.1.1.3",
              "versionStartIncluding": "17.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "378A6357-9A1E-40B9-A345-62004E82F222",
              "versionEndExcluding": "17.1.1.3",
              "versionStartIncluding": "17.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_container_ingress_services:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "337832BC-FF7C-4A19-8917-A6FDF4ADD438",
              "versionEndExcluding": "17.1.1.3",
              "versionStartIncluding": "17.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "342A8B0F-F990-4C7E-BA32-A44B149FEB7B",
              "versionEndExcluding": "17.1.1.3",
              "versionStartIncluding": "17.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "03508DF4-0946-4C37-8F9D-CF9B621F8440",
              "versionEndExcluding": "17.1.1.3",
              "versionStartIncluding": "17.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DAABAA1-8771-495B-8240-542D823E823A",
              "versionEndExcluding": "17.1.1.3",
              "versionStartIncluding": "17.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "92272C2B-FF9C-415E-A06A-9E70CDE3522A",
              "versionEndExcluding": "17.1.1.3",
              "versionStartIncluding": "17.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DF45568-9476-4FFD-9C21-81D88468C4AE",
              "versionEndExcluding": "17.1.1.3",
              "versionStartIncluding": "17.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48D2848A-4D74-4769-A396-F47D19509D4D",
              "versionEndExcluding": "17.1.1.3",
              "versionStartIncluding": "17.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA5DFA1B-6D6F-47EE-A820-1A0255424723",
              "versionEndExcluding": "17.1.1.3",
              "versionStartIncluding": "17.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D50883DB-C4EC-4797-8765-73725F545F46",
              "versionEndExcluding": "17.1.1.3",
              "versionStartIncluding": "17.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BE6B36A-A2B8-4B23-9C1C-0CB9D39660D7",
              "versionEndExcluding": "17.1.1.3",
              "versionStartIncluding": "17.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A82C9E0-4ECB-4B45-92AB-4084BDA22EB1",
              "versionEndExcluding": "17.1.1.3",
              "versionStartIncluding": "17.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "97E34573-A1D3-481F-A28A-7504DC3ECEA1",
              "versionEndExcluding": "17.1.1.3",
              "versionStartIncluding": "17.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "\nA reflected cross-site scripting (XSS) vulnerability exist in undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated"
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad de cross site scripting (XSS) reflejado en una p\u00e1gina no revelada de la utilidad de configuraci\u00f3n BIG-IP que permite a un atacante ejecutar JavaScript en el contexto del usuario actualmente conectado. Nota: Las versiones de software que han llegado al final del soporte t\u00e9cnico (EoTS) no se eval\u00faan"
    }
  ],
  "id": "CVE-2024-33604",
  "lastModified": "2025-10-21T11:38:35.883",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "f5sirt@f5.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-05-08T15:15:10.733",
  "references": [
    {
      "source": "f5sirt@f5.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://my.f5.com/manage/s/article/K000138894"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://my.f5.com/manage/s/article/K000138894"
    }
  ],
  "sourceIdentifier": "f5sirt@f5.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "f5sirt@f5.com",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…