ID

VAR-201411-0206


CVE

CVE-2014-8727


TITLE

F5 BIG-IP Vulnerable to directory traversal

Trust: 0.8

sources: JVNDB: JVNDB-2014-005492

DESCRIPTION

Multiple directory traversal vulnerabilities in F5 BIG-IP before 10.2.2 allow local users with the "Resource Administrator" or "Administrator" role to enumerate and delete arbitrary files via a .. (dot dot) in the name parameter to (1) tmui/Control/jspmap/tmui/system/archive/properties.jsp or (2) tmui/Control/form. ( Dot dot ) including (1) tmui/Control/jspmap/tmui/system/archive/properties.jsp Or (2) tmui/Control/form of name Arbitrary files may be enumerated and deleted via parameters. F5 Networks BIG-IP is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input. F5 BIG-IP is an all-in-one network device integrated with network traffic management, application security management, load balancing and other functions from F5 Corporation of the United States. There is a directory traversal vulnerability in F5 BIG-IP 10.2.1 and earlier versions. The vulnerability is caused by the tmui/Control/jspmap/tmui/system/archive/properties.jsp script and tmui/Control/form URL not adequately filtering the 'name' parameter

Trust: 1.98

sources: NVD: CVE-2014-8727 // JVNDB: JVNDB-2014-005492 // BID: 71063 // VULHUB: VHN-76672

AFFECTED PRODUCTS

vendor:f5model:big-ip local traffic managerscope:lteversion:10.2.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:10.2.2

Trust: 0.8

vendor:f5model:big-ip local traffic managerscope:eqversion:10.2.1

Trust: 0.6

vendor:f5model:bigip local traffic managerscope:eqversion:10.1

Trust: 0.3

sources: BID: 71063 // JVNDB: JVNDB-2014-005492 // CNNVD: CNNVD-201411-273 // NVD: CVE-2014-8727

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-8727
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-8727
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201411-273
value: MEDIUM

Trust: 0.6

VULHUB: VHN-76672
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-8727
severity: MEDIUM
baseScore: 6.2
vectorString: AV:L/AC:L/AU:S/C:N/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.1
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-76672
severity: MEDIUM
baseScore: 6.2
vectorString: AV:L/AC:L/AU:S/C:N/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.1
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-76672 // JVNDB: JVNDB-2014-005492 // CNNVD: CNNVD-201411-273 // NVD: CVE-2014-8727

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.9

sources: VULHUB: VHN-76672 // JVNDB: JVNDB-2014-005492 // NVD: CVE-2014-8727

THREAT TYPE

local

Trust: 0.9

sources: BID: 71063 // CNNVD: CNNVD-201411-273

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-201411-273

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-005492

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-76672

PATCH

title:Release Note: BIG-IP LTM and TMOS version 11.0.0url:https://support.f5.com/kb/en-us/products/big-ip_ltm/releasenotes/product/relnote_11_0_0_ltm.html

Trust: 0.8

title:sol13109: Overview of BIG-IP version 10.2.2 cumulative hotfixesurl:https://support.f5.com/kb/en-us/solutions/public/13000/100/sol13109.html

Trust: 0.8

title:Hotfix-BIGIP-10.2.2-969.0-HF4url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=55990

Trust: 0.6

sources: JVNDB: JVNDB-2014-005492 // CNNVD: CNNVD-201411-273

EXTERNAL IDS

db:NVDid:CVE-2014-8727

Trust: 2.8

db:BIDid:71063

Trust: 2.0

db:PACKETSTORMid:129084

Trust: 1.7

db:EXPLOIT-DBid:35222

Trust: 1.7

db:SECTRACKid:1031216

Trust: 1.1

db:JVNDBid:JVNDB-2014-005492

Trust: 0.8

db:CNNVDid:CNNVD-201411-273

Trust: 0.7

db:SEEBUGid:SSVID-89539

Trust: 0.1

db:SEEBUGid:SSVID-89443

Trust: 0.1

db:VULHUBid:VHN-76672

Trust: 0.1

sources: VULHUB: VHN-76672 // BID: 71063 // JVNDB: JVNDB-2014-005492 // CNNVD: CNNVD-201411-273 // NVD: CVE-2014-8727

REFERENCES

url:https://support.f5.com/kb/en-us/products/big-ip_ltm/releasenotes/product/relnote_11_0_0_ltm.html

Trust: 2.0

url:http://www.securityfocus.com/bid/71063

Trust: 1.7

url:https://support.f5.com/kb/en-us/solutions/public/13000/100/sol13109.html

Trust: 1.7

url:http://www.exploit-db.com/exploits/35222

Trust: 1.7

url:http://packetstormsecurity.com/files/129084/f5-big-ip-10.1.0-directory-traversal.html

Trust: 1.7

url:http://www.securitytracker.com/id/1031216

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/98676

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8727

Trust: 0.8

url:https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-8727

Trust: 0.8

url:http://www.f5.com/products/big-ip/

Trust: 0.3

sources: VULHUB: VHN-76672 // BID: 71063 // JVNDB: JVNDB-2014-005492 // CNNVD: CNNVD-201411-273 // NVD: CVE-2014-8727

CREDITS

Anastasios Monachos

Trust: 0.3

sources: BID: 71063

SOURCES

db:VULHUBid:VHN-76672
db:BIDid:71063
db:JVNDBid:JVNDB-2014-005492
db:CNNVDid:CNNVD-201411-273
db:NVDid:CVE-2014-8727

LAST UPDATE DATE

2025-04-13T23:36:30.405000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-76672date:2017-09-08T00:00:00
db:BIDid:71063date:2015-03-19T08:08:00
db:JVNDBid:JVNDB-2014-005492date:2014-11-19T00:00:00
db:CNNVDid:CNNVD-201411-273date:2014-11-18T00:00:00
db:NVDid:CVE-2014-8727date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-76672date:2014-11-17T00:00:00
db:BIDid:71063date:2014-11-12T00:00:00
db:JVNDBid:JVNDB-2014-005492date:2014-11-19T00:00:00
db:CNNVDid:CNNVD-201411-273date:2014-11-18T00:00:00
db:NVDid:CVE-2014-8727date:2014-11-17T16:59:07.433