5.5
CVSSv2

CVE-2019-6617

Published: 03/05/2019 Updated: 16/02/2023
CVSS v2 Base Score: 5.5 | Impact Score: 4.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 5.2 | Exploitability Score: 1.2
VMScore: 490
Vector: AV:N/AC:L/Au:S/C:N/I:P/A:P

Vulnerability Summary

On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.2-11.5.8, a user with the Resource Administrator role is able to overwrite sensitive low-level files (such as /etc/passwd) using SFTP to modify user permissions, without Advanced Shell access. This is contrary to our definition for the Resource Administrator (RA) role restrictions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

f5 big-ip access policy manager

f5 big-ip advanced firewall manager

f5 big-ip application acceleration manager

f5 big-ip link controller

f5 big-ip policy enforcement manager

f5 big-ip webaccelerator

f5 big-ip application security manager

f5 big-ip local traffic manager

f5 big-ip fraud protection service

f5 big-ip global traffic manager

f5 big-ip analytics

f5 big-ip edge gateway

f5 big-ip domain name system

Vendor Advisories

Debian Bug report logs - #949554 CVE-2019-6617 Package: src:libstb; Maintainer for src:libstb is Yangfl <mmyangfl@gmailcom>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Tue, 21 Jan 2020 22:21:01 UTC Severity: normal Tags: security Forwarded to githubcom/nothings/stb/issues/867 Reply or subs ...