CVE-2024-47139
📋 TL;DR
A stored cross-site scripting (XSS) vulnerability in the BIG-IQ Configuration utility allows authenticated administrators to inject malicious JavaScript that executes in other users' browsers. This affects BIG-IQ systems with vulnerable versions, potentially compromising user sessions and administrative functions.
💻 Affected Systems
- F5 BIG-IQ Centralized Management
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An attacker with administrator credentials could steal session tokens, perform actions as other users, or deploy malware to administrative workstations.
Likely Case
Privilege escalation within the BIG-IQ system, session hijacking of administrative users, or data exfiltration from the management interface.
If Mitigated
Limited impact if proper access controls restrict administrator accounts and network segmentation isolates the BIG-IQ management interface.
🎯 Exploit Status
Exploitation requires an authenticated administrator account; stored XSS means payload persists and affects multiple users.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check F5 advisory K000141080 for specific fixed versions
Vendor Advisory: https://my.f5.com/manage/s/article/K000141080
Restart Required: Yes
Instructions:
1. Review F5 advisory K000141080 for affected and fixed versions. 2. Upgrade BIG-IQ to a patched version as specified in the advisory. 3. Restart the BIG-IQ system after patching.
🔧 Temporary Workarounds
Restrict Administrator Access
allLimit the number of administrator accounts and enforce strong authentication to reduce attack surface.
Network Segmentation
allIsolate the BIG-IQ Configuration utility to trusted networks only, preventing external access.
🧯 If You Can't Patch
- Implement strict access controls: Use multi-factor authentication for administrator accounts and monitor for suspicious activity.
- Apply input validation: If possible, configure web application firewalls (WAF) to block XSS payloads targeting the BIG-IQ interface.
🔍 How to Verify
Check if Vulnerable:
Check the BIG-IQ version against the affected versions listed in F5 advisory K000141080.
Check Version:
Log into BIG-IQ CLI and run: 'cat /etc/issue' or check via the web interface under System > Configuration > Device.
Verify Fix Applied:
After patching, verify the BIG-IQ version matches or exceeds the fixed version specified in the advisory.
📡 Detection & Monitoring
Log Indicators:
- Unusual administrator login patterns
- JavaScript payloads in BIG-IQ web logs
- Unexpected configuration changes
Network Indicators:
- HTTP requests with suspicious script tags or JavaScript to BIG-IQ management interface
SIEM Query:
Search for web logs from BIG-IQ containing patterns like '<script>', 'javascript:', or encoded XSS payloads.