Bug ID 475556: Custom X-forwarded-for headers should take prioriy over xff headers

Last Modified: Nov 07, 2022

Bug Tracker

Affected Product:  See more info
BIG-IP ASM, AVR(all modules)

Known Affected Versions:
11.4.0, 11.4.1, 11.5.0, 11.5.1, 11.5.1 HF1, 11.5.1 HF10, 11.5.1 HF11, 11.5.1 HF2, 11.5.1 HF3, 11.5.1 HF4, 11.5.1 HF5, 11.5.1 HF6, 11.5.1 HF7, 11.5.1 HF8, 11.5.1 HF9, 11.5.10, 11.5.2, 11.5.2 HF1, 11.5.3, 11.5.3 HF1, 11.5.3 HF2, 11.5.4, 11.5.4 HF1, 11.5.4 HF2, 11.5.4 HF3, 11.5.4 HF4, 11.5.5, 11.5.6, 11.5.7, 11.5.8, 11.5.9, 11.6.0, 11.6.0 HF1, 11.6.0 HF2, 11.6.0 HF3, 11.6.0 HF4, 11.6.0 HF5, 11.6.0 HF6, 11.6.0 HF7, 11.6.0 HF8, 11.6.1, 11.6.1 HF1, 11.6.1 HF2, 11.6.2, 11.6.2 HF1, 11.6.3, 11.6.3.1, 11.6.3.2, 11.6.3.3, 11.6.3.4, 11.6.4, 11.6.5, 11.6.5.1, 11.6.5.2, 11.6.5.3

Fixed In:
12.0.0, 11.4.1 HF6

Opened: Aug 14, 2014
Severity: 3-Major

Symptoms

If a HTTP flow has both an X-Forwarded-For (XFF) header and a custom header containing the true client IP, the IP in the XFF header will take priority.

Impact

wrong source IP is listed. May apply wrong irules, wrong ip intelligence etc.

Conditions

Both X-forwarded-for and custom headers are marked and used. A Request arrives with both X-forwarded-for and a custom header.

Workaround

N/A

Fix Information

AVR IP collection and the DOS attack detection: Previously, if an HTTP profile has both XFF and one or more custom headers (called "Alternate headers" in the Configuration utility), the system took the last header (whether it is the actual X-Forwarded-For or the custom header) and used that as the header from which to extract the IP address. Now, the system uses the last custom header, even if it comes before the last XFF header.

Behavior Change