For more information regarding the security incident at F5, the actions we are taking to address it, and our ongoing efforts to protect our customers, click here.

Forum Discussion

draco's avatar
draco
Icon for Nimbostratus rankNimbostratus
Jan 22, 2018

post body data parameters-f5 asm

Hi

 

was deploying f5 asm for oracle erp application.In one of the url, i see below :-

 

/OA_HTML/RF.jsp ->

 

POST /OA_HTML/RF.jsp?function_id=ATTACHREST&security_group_id=0&isReadOnlyCustomPopup=Y HTTP/1.1 Accept: / OAFunc: FND_DIALOG_PAGE Content-Type: application/xml Referer: .. Accept-Language: en-US User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Host: xxxxx Content-Length: 374 Connection: Keep-Alive Cache-Control: no-cache Cookie: oracle.uix=0^^GMT+3:00^p; BIGipServerAstad_EBS_New_Production.app~Astad_EBS_New_Production_pool=285673482.18975.0000; treemenu1=none open; TS0138831c=01a978a1118e5f142c8bdedb210759f1efd1cbb0e7858f7defc2b66744ee059917758af593252e6894b3d7d77ccecbdf6b0b1d8714d82627e6751b69c4203d9c2a3a03ebce; JSESSIONID=sKBjhfTGJx2vgPgChKLf0NRg4QS6MKD1nzrbn2vTRB6sFZHstT59!-1288392341; SEN=PxNOVkXYr6XhV5sczV6xUMxBEs; TS01e2cc2e=01a978a11159660c4ab4659f98b13ba4e89cb6d882858f7defc2b66744ee059917758af5936cc77f9eb059c70455c2863c6aecfab53595c2cdd64bf1594b170cc87d60a700 X-Forwarded-For: yyyy

 

oracle.apps.ap.invoice.request.negotiation.server.NegotiationAMgetListOfFilesAttachment::Attach_0_::ATTACH_/oracle/apps/ap/invoice/request/negotiation/webui/InvPoReqNegoPG.Attachment::yy.xx::516040::true::true::true::true::ATTACHMENT_LINK_06N

 

F5 asm detects the whole as a parameter and detects the param tag vulnerability.I am cross checking with the application as well. But there are many param tag in the several other post body data. How do i add exception for this and other tag for this url , and remove this attack signature from blocking ? the param fields differ for other sessions and other tabs. but i believe the url is the same , do you think i add a wildcard parameter for this url and remove the attack signature inspection for that ?

 

 

No RepliesBe the first to reply