V-266158
F5 BIG-IP TMOS ALG Security Technical Implementation Guide
Title
The F5 BIG-IP appliance must check the validity of all data inputs except those specifically identified by the organization.
Description
<VulnDiscussion>Invalid user input occurs when a user inserts data or characters into an application's data entry fields and the application is unprepared to process that data. This results in unanticipated application behavior potentially leading to an application or information system compromise. Invalid input is one of the primary methods employed when attempting to compromise an application. Network devices with the functionality to perform application layer inspection may be leveraged to v...
Fix Text (Documentation Requirement)
From the BIG-IP GUI: 1. Security. 2. Application Security. 3. Parameters. 4. Parameters List. 5. Select the appropriate policy from the drop-down menu in the top left. 6. Configure the appropriate parameters for the application (e.g., character set, length, numerical range, and acceptable values). Refer to vendor documentation for more information.