Vulnerability Details CVE-2020-5889
On versions 15.1.0-15.1.0.1, 15.0.0-15.0.1.2, and 14.1.0-14.1.2.3, in BIG-IP APM portal access, a specially crafted HTTP request can lead to reflected XSS after the BIG-IP APM system rewrites the HTTP response from the untrusted backend server and sends it to the client.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 37.5%
CVSS Severity
CVSS v3 Score 5.4
CVSS v2 Score 3.5
Products affected by CVE-2020-5889
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.1
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.2
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.2.0.45.4
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.2.0.62.4
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.3
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.3.0.79.6
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.3.0.97.6
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.3.0.99.6
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.5
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.5.0.15.5
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.5.0.36.5
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.5.0.40.5
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.6
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.6.0.11.9
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.6.0.14.9
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.6.0.68.9
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.6.0.70.9
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2-0.0.37
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2-0.89.37
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.0.11.37
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.0.18.37
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.0.32.37
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.1
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.1-0.0.4
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.1.0.105.4
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.1.0.111.4
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.1.0.115.4
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.1.0.122.4
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.1.0.14.4
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.1.0.16.4
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.1.0.34.4
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.1.0.46.4
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.1.0.83.4
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.1.0.97.4
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.1.0.99.4
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.2
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.2-0.0.4
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.3
-
cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0
-
cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.1
-
cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.1.0.33.11
-
cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.1.0.48.11
-
cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.1.1
-
cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.1.2
-
cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.0
-
cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.0.1