On BIG-IP APM versions 15.1.x before 15.1.3, 14.1.x before 14.1.4.1, 13.1.x before 13.1.4, and all versions of 16.0.x, 12.1.x, and 11.6.x, an attacker may be able to bypass APM's internal restrictions and retrieve static content that is hosted within APM by sending specifically crafted requests to an APM Virtual Server. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://support.f5.com/csp/article/K75540265 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: f5
Published:
Updated: 2024-08-03T18:58:26.272Z
Reserved: 2021-01-06T00:00:00
Link: CVE-2021-23016

No data.

Status : Modified
Published: 2021-05-10T15:15:07.523
Modified: 2024-11-21T05:51:09.377
Link: CVE-2021-23016

No data.