Bug ID 612584: Server side blocking/asm cookie setting may not work under some circumstances

Last Modified: Sep 13, 2023

Affected Product(s):
BIG-IP ASM(all modules)

Known Affected Versions:
12.1.2, 12.1.3, 12.1.3.1, 12.1.3.2, 12.1.3.3, 12.1.3.4, 12.1.3.5, 12.1.3.6, 12.1.3.7, 12.1.4, 12.1.4.1, 12.1.5, 12.1.5.1, 12.1.5.2, 12.1.5.3, 12.1.6

Fixed In:
13.0.0

Opened: Aug 24, 2016

Severity: 2-Critical

Related Article: K34500121

Symptoms

ASM Cookies are not set, blocking doesn't happen due to server side violation (such as HTTP status or attack signature in response), or data guard masking/blocking doesn't happen.

Impact

False negative - missing blocking. False positives due to possible missing cookies.

Conditions

CSRF or web scraping is configured.

Workaround

Add the following iRule to the web server: when HTTP_REQUEST { if { [HTTP::uri] contains "TSbd"} { HTTP::header remove "Connection" HTTP::header insert "connection" "close" } }

Fix Information

Issue with missing violations was fixed.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips