Bug ID 461234: AVR/ASM: Traffic with malformed XFF when Accept/Trust XFF is enabled

Last Modified: Apr 28, 2025

Affected Product(s):
BIG-IP ASM, AVR(all modules)

Known Affected Versions:
11.6.0, 11.6.0 HF1, 11.6.0 HF2, 11.6.0 HF3, 11.6.0 HF4, 11.6.0 HF5, 11.6.0 HF6, 11.6.0 HF7, 11.6.0 HF8, 11.6.1, 11.6.1 HF1, 11.6.1 HF2, 11.6.2, 11.6.2 HF1, 11.6.3, 11.6.3.1, 11.6.3.2, 11.6.3.3, 11.6.3.4, 11.6.4, 11.6.5, 11.6.5.1, 11.6.5.2, 11.6.5.3

Fixed In:
12.0.0

Opened: May 08, 2014

Severity: 4-Minor

Symptoms

If the system processes HTTP requests with malformed XFF, and the security policy's "Accept XFF/Trust XFF Header" option is enabled, the IP addresses that sent this traffic are identified as the IPv6 address "::".

Impact

Traffic identified incorrectly

Conditions

malformed XFF passed in

Workaround

None

Fix Information

If the system processes HTTP requests with malformed XFF, and the security policy's "Accept XFF/Trust XFF Header" option is enabled, the system now correctly identifies the real IP addresses that sent this traffic, and they are no longer shown as "::".

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips