When a BIG-IP Advanced WAF or BIG-IP ASM policy with a Request Body Handling option is attached to a virtual server, undisclosed requests can cause the BD process to terminate. The condition results from setting the Request Body Handling option in the Header-Based Content Profile for an Allowed URL with "Apply value and content signatures and detect threat campaigns." Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://my.f5.com/manage/s/article/K000137416 |
History
Thu, 12 Dec 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
F5
F5 big-ip Advanced Web Application Firewall F5 big-ip Application Security Manager |
|
CPEs | cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* |
|
Vendors & Products |
F5
F5 big-ip Advanced Web Application Firewall F5 big-ip Application Security Manager |
MITRE
Status: PUBLISHED
Assigner: f5
Published: 2024-02-14T16:30:24.610Z
Updated: 2024-08-01T22:59:32.144Z
Reserved: 2024-02-01T22:13:58.499Z
Link: CVE-2024-23308
Vulnrichment
Updated: 2024-08-01T22:59:32.144Z
NVD
Status : Analyzed
Published: 2024-02-14T17:15:13.200
Modified: 2024-12-12T19:10:12.500
Link: CVE-2024-23308
Redhat
No data.