Forum Discussion

6 Replies

  • in lieu of a signature, this should be an easy block by adding a disallowed parameter as such:

    CP=%2fweb.config
    • THE_BLUE's avatar
      THE_BLUE
      Icon for Cirrostratus rankCirrostratus

      but is this mean there is no pre-defied signature from F5 ASM ?

      if i have not add this parameter as disallowed, does ASM will pass the traffic with no block ?

  • We have added a dedicated signature on the last signature update that mitigates this vulnerability:

     

    200007038 - DotNetNuke - GetCSS Arbitrary File Read

     

    Also on a side note, the POC exploit for this vulnerability is matched by the following signature:

     

    200000042 -  ASP.NET configuration file access (web.config) (Parameter)

    • THE_BLUE's avatar
      THE_BLUE
      Icon for Cirrostratus rankCirrostratus

      I could not find this signature 200007038 - DotNetNuke - GetCSS Arbitrary File Read , how to install it?

      • boneyard's avatar
        boneyard
        Icon for MVP rankMVP

        follow the documentation on updating: https://support.f5.com/csp/article/K8217

         

        then check it in your ASM profile