The svpn and policyserver components of the F5 BIG-IP APM client prior to version 7.1.7.1 for Linux and macOS runs as a privileged process and can allow an unprivileged user to get ownership of files owned by root on the local client host. A malicious local unprivileged user may gain knowledge of sensitive information, manipulate certain data, or assume super-user privileges on the local client host.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://support.f5.com/csp/article/K54431371 | vendor advisory |
http://www.securitytracker.com/id/1041510 | vdb entry broken link |
https://github.com/mirchr/security-research/blob/master/vulnerabilities/F5/CVE-2018-5529.txt | third party advisory exploit |