Forum Discussion
Someone claiming "User Enumeration Flaw" in BIG-IQ, pretty sure its intended behavior
Recently came across this post it's kind of hard to understand, but I'm almost sure that this is the intended behavior of the REST API considering you have to log in to access the URL. I think it's kind of silly to expose the user's password hash but this really shouldn't be an issue if the hash algorithm is strong enough, not to mention the fact that only legitimate users can access this part of the API. I was wondering if I can get some confirmation, or see what you guys think about this.
4 Replies
- Max_Q_factor
Cirrocumulus
I think it might be best to drop an e-mail to technical support, or security-reporting@f5.com to get an official response based on SOL4602: Overview of the F5 security vulnerability response policy
- 0_168831
Nimbostratus
I don't have an official support contract with F5, I'm merely doing security research, do you think they would still respond? - Max_Q_factor
Cirrocumulus
Yes, security-reporting@f5.com is specifically setup to interact with people who are not F5 customers. - 0_168831
Nimbostratus
Awesome, thank you!
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com