Skip to content

Commit 6110843

Browse files
committed
The F5 cookie decoder doesn't detect IPs in the 10.x.x.x space for non-encrypted cookies.
This fixes the regex pattern, see also https://github.com/drwetter/F5-BIGIP-Decoder/pull/4/files
1 parent 541d3ff commit 6110843

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

testssl.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3284,7 +3284,7 @@ sub_f5_bigip_check() {
32843284
[[ -z "$cookievalue" ]] && break
32853285
cookievalue=${cookievalue/;/}
32863286
debugme echo $cookiename : $cookievalue
3287-
if grep -Eq '[0-9]{9,10}\.[0-9]{3,5}\.0000' <<< "$cookievalue"; then
3287+
if grep -Eq '[0-9]{8,10}\.[0-9]{3,5}\.0000' <<< "$cookievalue"; then
32883288
ip="$(f5_ip_oldstyle "$cookievalue")"
32893289
port="$(f5_port_decode $cookievalue)"
32903290
out "${spaces}F5 cookie (default IPv4 pool member): "; pr_italic "$cookiename "; prln_svrty_medium "${ip}:${port}"

0 commit comments

Comments
 (0)