cloud
3879 TopicsMitigating OWASP Web Application Risk: Vulnerable and Outdated Components using F5 BIG-IP
This article provides information on the Struts 2 vulnerability (CVE-2017-5638) , one of the dangers posed by vulnerable and outdated components. It highlights how a single unpatched vulnerability in a widely used framework can lead to catastrophic consequences, including data breaches, server compromise, and damage to an organisation's reputation and how we can protect it using F5 BIG-IP Advanced WAF.88Views0likes0CommentsF5 XC and Service Policy/HTTP path
Hi Team, We are migrating some ASM policies to the XC platform. However, the customer has a long list of URLs allowed by the ASM policy. I understand that the Service Policy on XC is the functionality to use in this case, but I received an error message: "We found 1 error: Field 'Exact Values' in HTTP Path must contain no more than 16 item(s)." Perhaps some URLs can be changed to regular expressions, but I'm unsure how to reduce this to only 16 items. Any ideas or suggestion would be appreciatedSolved36Views0likes1CommentF5 XC vk8s open source nginx deployment on RE
Code is community submitted, community supported, and recognized as ‘Use At Your Own Risk’. Short Description This an example for F5 XC virtual kubernetes (vk8s) workload on Regional Edges for rewriting the URL requests and response body. Problem solved by this Code Snippet The XC Distributed Cloud rewrite option under the XC routes is sometimes limited in dynamically replacing a specific sting like for example to replace the string "ne" with "da" no matter where in the url the string is located. location ~ .*ne.* { rewrite ^(.*)ne(.*) $1da$2; } Other than that in XC there is no default option to replace a string in the payload like rewrite profile in F5 LTM or iRule stream option. sub_filter 'Example' 'NIKI'; sub_filter_types *; sub_filter_once off; Open source NGINX can also be used to return custom error based on the server error as well: error_page 404 /custom_404.html; location = /custom_404.html { return 404 'gangnam style!'; internal; } Now with proxy protocol support in XC the Nginx can see real client ip even for non-HTTP traffic that does not have XFF HTTP headers. log_format niki '$proxy_protocol_addr - $remote_addr - $remote_user [$time_local] - $proxy_add_x_forwarded_for' '"$request" $status $body_bytes_sent ' '"$http_referer" "$http_user_agent"'; #limit_req_zone $binary_remote_addr zone=mylimit:10m rate=1r/s; server { listen 8080 proxy_protocol; server_name localhost; A cool feature that can be used for implementing HTTP redirection protection similar to AWAF/ASM ""K04211103: Configuring HTTP redirection protection"" as the nginx by default can rewrite the redirects (Module ngx_http_proxy_module) and all not allowed redirects can be send to XC route that has a custom response and combining this with the MAP option you implement "if else" functions, map $host $public_base_url { default ""; site1.com https://public-site1.com; site2.com https://public-site2.com; } location / { proxy_pass http://backend; # Rewrite Location headers from backend proxy_redirect http://internal.example.com/ $public_base_url/; } How to use this Code Snippet Read the description readme file in the github link and modify the nginx default.conf file as per your needs. Code Snippet Meta Information Version: 1.25.4 Nginx Coding Language: nginx config Full Code Snippet https://github.com/Nikoolayy1/xc_nginx/tree/main217Views0likes3Comments