Search criteria

2 vulnerabilities found for VMware Tanzu Application Service for VMs by VMware Tanzu

CVE-2020-5414 (GCVE-0-2020-5414)

Vulnerability from cvelistv5 – Published: 2020-07-31 19:40 – Updated: 2024-09-17 00:37
VLAI?
Summary
VMware Tanzu Application Service for VMs (2.7.x versions prior to 2.7.19, 2.8.x versions prior to 2.8.13, and 2.9.x versions prior to 2.9.7) contains an App Autoscaler that logs the UAA admin password. This credential is redacted on VMware Tanzu Operations Manager; however, the unredacted logs are available to authenticated users of the BOSH Director. This credential would grant administrative privileges to a malicious user. The same versions of App Autoscaler also log the App Autoscaler Broker password. Prior to newer versions of Operations Manager, this credential was not redacted from logs. This credential allows a malicious user to create, delete, and modify App Autoscaler services instances. Operations Manager started redacting this credential from logs as of its versions 2.7.15, 2.8.6, and 2.9.1. Note that these logs are typically only visible to foundation administrators and operators.
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
References
Impacted products
Vendor Product Version
VMware Tanzu PCF Autoscaling Affected: All , < v232 (custom)
Create a notification for this product.
    VMware Tanzu Operations Manager Affected: 2.7 , < 2.7.15 (custom)
Affected: 2.8 , < 2.8.6 (custom)
Affected: 2.9 , < 2.9.1 (custom)
Create a notification for this product.
    VMware Tanzu VMware Tanzu Application Service for VMs Affected: 2.9.x , < 2.9.7 (custom)
Affected: 2.7.x , < 2.7.19 (custom)
Affected: 2.8.x , < 2.8.13 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T08:30:24.291Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://tanzu.vmware.com/security/cve-2020-5414"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "PCF Autoscaling",
          "vendor": "VMware Tanzu",
          "versions": [
            {
              "lessThan": "v232",
              "status": "affected",
              "version": "All",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Operations Manager",
          "vendor": "VMware Tanzu",
          "versions": [
            {
              "lessThan": "2.7.15",
              "status": "affected",
              "version": "2.7",
              "versionType": "custom"
            },
            {
              "lessThan": "2.8.6",
              "status": "affected",
              "version": "2.8",
              "versionType": "custom"
            },
            {
              "lessThan": "2.9.1",
              "status": "affected",
              "version": "2.9",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "VMware Tanzu Application Service for VMs",
          "vendor": "VMware Tanzu",
          "versions": [
            {
              "lessThan": "2.9.7",
              "status": "affected",
              "version": "2.9.x",
              "versionType": "custom"
            },
            {
              "lessThan": "2.7.19",
              "status": "affected",
              "version": "2.7.x",
              "versionType": "custom"
            },
            {
              "lessThan": "2.8.13",
              "status": "affected",
              "version": "2.8.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2020-07-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "VMware Tanzu Application Service for VMs (2.7.x versions prior to 2.7.19, 2.8.x versions prior to 2.8.13, and 2.9.x versions prior to 2.9.7) contains an App Autoscaler that logs the UAA admin password. This credential is redacted on VMware Tanzu Operations Manager; however, the unredacted logs are available to authenticated users of the BOSH Director. This credential would grant administrative privileges to a malicious user. The same versions of App Autoscaler also log the App Autoscaler Broker password. Prior to newer versions of Operations Manager, this credential was not redacted from logs. This credential allows a malicious user to create, delete, and modify App Autoscaler services instances. Operations Manager started redacting this credential from logs as of its versions 2.7.15, 2.8.6, and 2.9.1. Note that these logs are typically only visible to foundation administrators and operators."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-31T19:40:20",
        "orgId": "862b2186-222f-48b9-af87-f1fb7bb26d03",
        "shortName": "pivotal"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://tanzu.vmware.com/security/cve-2020-5414"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "App Autoscaler logs credentials",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@pivotal.io",
          "DATE_PUBLIC": "2020-07-30T23:34:26.000Z",
          "ID": "CVE-2020-5414",
          "STATE": "PUBLIC",
          "TITLE": "App Autoscaler logs credentials"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "PCF Autoscaling",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "All",
                            "version_value": "v232"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Operations Manager",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "2.7",
                            "version_value": "2.7.15"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "2.8",
                            "version_value": "2.8.6"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "2.9",
                            "version_value": "2.9.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "VMware Tanzu Application Service for VMs",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "2.9.x",
                            "version_value": "2.9.7"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "2.7.x",
                            "version_value": "2.7.19"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "2.8.x",
                            "version_value": "2.8.13"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "VMware Tanzu"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VMware Tanzu Application Service for VMs (2.7.x versions prior to 2.7.19, 2.8.x versions prior to 2.8.13, and 2.9.x versions prior to 2.9.7) contains an App Autoscaler that logs the UAA admin password. This credential is redacted on VMware Tanzu Operations Manager; however, the unredacted logs are available to authenticated users of the BOSH Director. This credential would grant administrative privileges to a malicious user. The same versions of App Autoscaler also log the App Autoscaler Broker password. Prior to newer versions of Operations Manager, this credential was not redacted from logs. This credential allows a malicious user to create, delete, and modify App Autoscaler services instances. Operations Manager started redacting this credential from logs as of its versions 2.7.15, 2.8.6, and 2.9.1. Note that these logs are typically only visible to foundation administrators and operators."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://tanzu.vmware.com/security/cve-2020-5414",
              "refsource": "CONFIRM",
              "url": "https://tanzu.vmware.com/security/cve-2020-5414"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "862b2186-222f-48b9-af87-f1fb7bb26d03",
    "assignerShortName": "pivotal",
    "cveId": "CVE-2020-5414",
    "datePublished": "2020-07-31T19:40:20.430539Z",
    "dateReserved": "2020-01-03T00:00:00",
    "dateUpdated": "2024-09-17T00:37:24.104Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-5414 (GCVE-0-2020-5414)

Vulnerability from nvd – Published: 2020-07-31 19:40 – Updated: 2024-09-17 00:37
VLAI?
Summary
VMware Tanzu Application Service for VMs (2.7.x versions prior to 2.7.19, 2.8.x versions prior to 2.8.13, and 2.9.x versions prior to 2.9.7) contains an App Autoscaler that logs the UAA admin password. This credential is redacted on VMware Tanzu Operations Manager; however, the unredacted logs are available to authenticated users of the BOSH Director. This credential would grant administrative privileges to a malicious user. The same versions of App Autoscaler also log the App Autoscaler Broker password. Prior to newer versions of Operations Manager, this credential was not redacted from logs. This credential allows a malicious user to create, delete, and modify App Autoscaler services instances. Operations Manager started redacting this credential from logs as of its versions 2.7.15, 2.8.6, and 2.9.1. Note that these logs are typically only visible to foundation administrators and operators.
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
References
Impacted products
Vendor Product Version
VMware Tanzu PCF Autoscaling Affected: All , < v232 (custom)
Create a notification for this product.
    VMware Tanzu Operations Manager Affected: 2.7 , < 2.7.15 (custom)
Affected: 2.8 , < 2.8.6 (custom)
Affected: 2.9 , < 2.9.1 (custom)
Create a notification for this product.
    VMware Tanzu VMware Tanzu Application Service for VMs Affected: 2.9.x , < 2.9.7 (custom)
Affected: 2.7.x , < 2.7.19 (custom)
Affected: 2.8.x , < 2.8.13 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T08:30:24.291Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://tanzu.vmware.com/security/cve-2020-5414"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "PCF Autoscaling",
          "vendor": "VMware Tanzu",
          "versions": [
            {
              "lessThan": "v232",
              "status": "affected",
              "version": "All",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Operations Manager",
          "vendor": "VMware Tanzu",
          "versions": [
            {
              "lessThan": "2.7.15",
              "status": "affected",
              "version": "2.7",
              "versionType": "custom"
            },
            {
              "lessThan": "2.8.6",
              "status": "affected",
              "version": "2.8",
              "versionType": "custom"
            },
            {
              "lessThan": "2.9.1",
              "status": "affected",
              "version": "2.9",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "VMware Tanzu Application Service for VMs",
          "vendor": "VMware Tanzu",
          "versions": [
            {
              "lessThan": "2.9.7",
              "status": "affected",
              "version": "2.9.x",
              "versionType": "custom"
            },
            {
              "lessThan": "2.7.19",
              "status": "affected",
              "version": "2.7.x",
              "versionType": "custom"
            },
            {
              "lessThan": "2.8.13",
              "status": "affected",
              "version": "2.8.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2020-07-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "VMware Tanzu Application Service for VMs (2.7.x versions prior to 2.7.19, 2.8.x versions prior to 2.8.13, and 2.9.x versions prior to 2.9.7) contains an App Autoscaler that logs the UAA admin password. This credential is redacted on VMware Tanzu Operations Manager; however, the unredacted logs are available to authenticated users of the BOSH Director. This credential would grant administrative privileges to a malicious user. The same versions of App Autoscaler also log the App Autoscaler Broker password. Prior to newer versions of Operations Manager, this credential was not redacted from logs. This credential allows a malicious user to create, delete, and modify App Autoscaler services instances. Operations Manager started redacting this credential from logs as of its versions 2.7.15, 2.8.6, and 2.9.1. Note that these logs are typically only visible to foundation administrators and operators."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-31T19:40:20",
        "orgId": "862b2186-222f-48b9-af87-f1fb7bb26d03",
        "shortName": "pivotal"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://tanzu.vmware.com/security/cve-2020-5414"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "App Autoscaler logs credentials",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@pivotal.io",
          "DATE_PUBLIC": "2020-07-30T23:34:26.000Z",
          "ID": "CVE-2020-5414",
          "STATE": "PUBLIC",
          "TITLE": "App Autoscaler logs credentials"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "PCF Autoscaling",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "All",
                            "version_value": "v232"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Operations Manager",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "2.7",
                            "version_value": "2.7.15"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "2.8",
                            "version_value": "2.8.6"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "2.9",
                            "version_value": "2.9.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "VMware Tanzu Application Service for VMs",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "2.9.x",
                            "version_value": "2.9.7"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "2.7.x",
                            "version_value": "2.7.19"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "2.8.x",
                            "version_value": "2.8.13"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "VMware Tanzu"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VMware Tanzu Application Service for VMs (2.7.x versions prior to 2.7.19, 2.8.x versions prior to 2.8.13, and 2.9.x versions prior to 2.9.7) contains an App Autoscaler that logs the UAA admin password. This credential is redacted on VMware Tanzu Operations Manager; however, the unredacted logs are available to authenticated users of the BOSH Director. This credential would grant administrative privileges to a malicious user. The same versions of App Autoscaler also log the App Autoscaler Broker password. Prior to newer versions of Operations Manager, this credential was not redacted from logs. This credential allows a malicious user to create, delete, and modify App Autoscaler services instances. Operations Manager started redacting this credential from logs as of its versions 2.7.15, 2.8.6, and 2.9.1. Note that these logs are typically only visible to foundation administrators and operators."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://tanzu.vmware.com/security/cve-2020-5414",
              "refsource": "CONFIRM",
              "url": "https://tanzu.vmware.com/security/cve-2020-5414"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "862b2186-222f-48b9-af87-f1fb7bb26d03",
    "assignerShortName": "pivotal",
    "cveId": "CVE-2020-5414",
    "datePublished": "2020-07-31T19:40:20.430539Z",
    "dateReserved": "2020-01-03T00:00:00",
    "dateUpdated": "2024-09-17T00:37:24.104Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}