The Single Sign-On (SSO) feature in F5 BIG-IP APM 11.x before 11.6.0 HF6 and BIG-IP Edge Gateway 11.0.0 through 11.3.0 might allow remote attackers to obtain sensitive SessionId information by leveraging access to the Location HTTP header in a redirect.
References
Link | Resource |
---|---|
http://www.securitytracker.com/id/1035519 | |
https://support.f5.com/kb/en-us/solutions/public/k/82/sol82679059.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2016-04-13 09:59
Updated : 2016-04-18 07:26
NVD link : CVE-2016-3686
Mitre link : CVE-2016-3686
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
f5
- big-ip_edge_gateway
- big-ip_access_policy_manager