Bug ID 1194173: BIG-IP does not block the request when a parameter as a cookie has URL encoded base64 padding value

Last Modified: May 29, 2024

Affected Product(s):
BIG-IP ASM(all modules)

Fixed In:
17.1.1, 16.1.4, 15.1.9

Opened: Nov 22, 2022

Severity: 3-Major

Symptoms

Attack signature check is not run on normalised parameter value.

Impact

- Attack signature not detected.

Conditions

- A parameter with location configured as a cookie is present in the parameters list. - Request contains the explicit parameter with URL encoded base64 padding value.

Workaround

None

Fix Information

The attack signature check runs on normalised parameter value.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips