Last Modified: Sep 13, 2023
Affected Product(s):
BIG-IP ASM
Known Affected Versions:
12.1.2, 12.1.3, 12.1.3.1, 12.1.3.2, 12.1.3.3, 12.1.3.4, 12.1.3.5, 12.1.3.6, 12.1.3.7, 12.1.4, 12.1.4.1, 12.1.5, 12.1.5.1, 12.1.5.2, 12.1.5.3, 12.1.6
Fixed In:
13.0.0
Opened: Aug 24, 2016 Severity: 2-Critical Related Article:
K34500121
ASM Cookies are not set, blocking doesn't happen due to server side violation (such as HTTP status or attack signature in response), or data guard masking/blocking doesn't happen.
False negative - missing blocking. False positives due to possible missing cookies.
CSRF or web scraping is configured.
Add the following iRule to the web server: when HTTP_REQUEST { if { [HTTP::uri] contains "TSbd"} { HTTP::header remove "Connection" HTTP::header insert "connection" "close" } }
Issue with missing violations was fixed.