CVE-2016-3686
13.04.2016, 16:59
The Single Sign-On (SSO) feature in F5 BIG-IP APM 11.x before 11.6.0 HF6 and BIG-IP Edge Gateway 11.0.0 through 11.3.0 might allow remote attackers to obtain sensitive SessionId information by leveraging access to the Location HTTP header in a redirect.Enginsight
Vendor | Product | Version |
---|---|---|
f5 | big-ip_edge_gateway | 11.0.0 |
f5 | big-ip_edge_gateway | 11.1.0 |
f5 | big-ip_edge_gateway | 11.2.0 |
f5 | big-ip_edge_gateway | 11.2.1 |
f5 | big-ip_edge_gateway | 11.3.0 |
f5 | big-ip_access_policy_manager | 11.0.0 |
f5 | big-ip_access_policy_manager | 11.1.0 |
f5 | big-ip_access_policy_manager | 11.2.0 |
f5 | big-ip_access_policy_manager | 11.2.1 |
f5 | big-ip_access_policy_manager | 11.3.0 |
f5 | big-ip_access_policy_manager | 11.4.0 |
f5 | big-ip_access_policy_manager | 11.4.1 |
f5 | big-ip_access_policy_manager | 11.5.0 |
f5 | big-ip_access_policy_manager | 11.5.1 |
f5 | big-ip_access_policy_manager | 11.5.2 |
f5 | big-ip_access_policy_manager | 11.5.3 |
f5 | big-ip_access_policy_manager | 11.5.4 |
f5 | big-ip_access_policy_manager | 11.6.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration