All the vulnerabilites related to cloudfoundry - cf-release
Vulnerability from fkie_nvd
Published
2017-06-13 06:29
Modified
2024-11-21 03:26
Severity ?
Summary
An issue was discovered in Cloud Foundry Foundation cf-release v255 and Staticfile buildpack versions v1.4.0 - v1.4.3. A regression introduced in the Static file build pack causes the Staticfile.auth configuration to be ignored when the Static file file is not present in the application root. Applications containing a Staticfile.auth file but not a Static file had their basic auth turned off when an operator upgraded the Static file build pack in the foundation to one of the vulnerable versions. Note that Static file applications without a Static file are technically misconfigured, and will not successfully detect unless the Static file build pack is explicitly specified.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://www.cloudfoundry.org/cve-2017-4970/ | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cloudfoundry.org/cve-2017-4970/ | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | cf-release | 255 | |
cloudfoundry | staticfile_buildpack | 1.4.0 | |
cloudfoundry | staticfile_buildpack | 1.4.1 | |
cloudfoundry | staticfile_buildpack | 1.4.2 | |
cloudfoundry | staticfile_buildpack | 1.4.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:255:*:*:*:*:*:*:*", "matchCriteriaId": "5046C2CB-99C6-4243-B830-B3957910F1AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:staticfile_buildpack:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "5701A18E-C1F0-4A2D-B2C4-A87F29FCA16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:staticfile_buildpack:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2087B57-6FCA-4FA6-8FB0-F2D998497B1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:staticfile_buildpack:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "1EBCCB10-2447-4DB1-A762-F07C1373A5E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:staticfile_buildpack:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "EA73D713-53B5-4F9D-97D7-E1BC391A9D26", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation cf-release v255 and Staticfile buildpack versions v1.4.0 - v1.4.3. A regression introduced in the Static file build pack causes the Staticfile.auth configuration to be ignored when the Static file file is not present in the application root. Applications containing a Staticfile.auth file but not a Static file had their basic auth turned off when an operator upgraded the Static file build pack in the foundation to one of the vulnerable versions. Note that Static file applications without a Static file are technically misconfigured, and will not successfully detect unless the Static file build pack is explicitly specified." }, { "lang": "es", "value": "Se detect\u00f3 un problema en cf-release versi\u00f3n v255 y Staticfile buildpack versiones v1.4.0 hasta v1.4.3 de Cloud Foundry Foundation. Una regresi\u00f3n introducida en el paquete de compilaci\u00f3n de archivos Static hace que la configuraci\u00f3n de Staticfile.auth sea ignorada cuando el archivo Static file no est\u00e9 presente en la aplicaci\u00f3n root. Las aplicaciones que contienen un archivo Staticfile.auth pero no un archivo Static tuvieron su identificaci\u00f3n b\u00e1sica desactivada cuando un operador actualiz\u00f3 el paquete de compilaci\u00f3n de archivos Static en la fundaci\u00f3n de una de las versiones vulnerables. Tomar en cuenta que las aplicaciones de archivos Static sin un archivo Static est\u00e1n mal configuradas t\u00e9cnicamente y no se detectar\u00e1n con \u00e9xito a menos que el paquete de compilaci\u00f3n de archivos Static sea especificada expl\u00edcitamente." } ], "id": "CVE-2017-4970", "lastModified": "2024-11-21T03:26:46.620", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-13T06:29:00.567", "references": [ { "source": "security_alert@emc.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-4970/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-4970/" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-05-25 17:29
Modified
2024-11-21 02:42
Severity ?
Summary
It was discovered that cf-release v231 and lower, Pivotal Cloud Foundry Elastic Runtime 1.5.x versions prior to 1.5.17 and Pivotal Cloud Foundry Elastic Runtime 1.6.x versions prior to 1.6.18 do not properly enforce disk quotas in certain cases. An attacker could use an improper disk quota value to bypass enforcement and consume all the disk on DEAs/CELLs causing a potential denial of service for other applications.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://pivotal.io/security/cve-2016-0780 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://pivotal.io/security/cve-2016-0780 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:231:*:*:*:*:*:*:*", "matchCriteriaId": "DBA563A9-3C12-4F83-9E63-BC03636BC799", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "472AA352-D04B-45D0-AAD7-95CE0738E9AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "9619B693-4B49-4FDC-AB49-5E6B2F124AB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "F7C2DED8-D527-4732-B57F-489CF5626352", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D585B534-0CD9-400D-A237-B026A83082C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "50C759FB-0796-4214-B085-0565AB75C216", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "8430DACA-7518-47BB-A89F-B7E83190C54C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "29F9167C-F195-4004-9EF4-43F199F05E3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "48B486D0-318D-4912-A992-5B89D93C11BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "E015CE12-73EB-4FAD-B569-719F93685B0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "16AE14C4-FA84-4E8B-9231-83DB4F71DC35", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "06576161-44B7-4EB1-8C26-C49CFF3FD11B", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "D6F9581A-42DB-4ADE-AFA1-2364371CC24A", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "2DCDE033-923F-4338-9E45-22FE684B43ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "D300B952-8EF3-4CB1-88B6-125837C3474B", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "71AFAFE8-3B21-4AF0-8B3D-597FEEFEEDE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "21202F77-DF05-4A07-8CEB-76DD03395957", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "1A9BA6EB-6BC0-4A74-9726-3F242D00FE78", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CC5918-BC38-46E3-8000-5FE87A65C0E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "36926681-35F4-4619-9613-155DEEEA3C8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "41FF3C2B-E96F-4DF7-A5C4-703206CB729E", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "F9CB3C2D-3080-4A3D-8D8D-1381B5D98920", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "782781EB-147C-4B00-84C5-1D8443BFA2D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "35A56755-EEB2-4C93-B180-3918A36965AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "E4009F10-08AF-470B-B903-38B8A6DBF332", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "2B2E8F04-53E6-4A3C-BE4B-8D0DDA22CA8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "790DAB24-893A-463F-8358-171DACD75074", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "3645A1A8-4945-447F-A968-101D5938F9C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "0E52C9B9-8F94-48D8-ADA6-96918F6AAD36", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "3948FC2F-AF3B-4AF3-968D-F124D03A213A", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "4BA44F9B-97D5-48C0-91E9-6D3FEC8B7773", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "7B414F88-6541-48C6-B9D6-4DDA035A0037", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "66235C7F-D5EE-4989-8D24-6D0781954234", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "12E75B49-2419-4313-A648-B5283DA620E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "EED70273-3FB2-4652-9AA2-10E2E9D581DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "A2C07910-C462-46C1-83CB-39B3FD8D25BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "It was discovered that cf-release v231 and lower, Pivotal Cloud Foundry Elastic Runtime 1.5.x versions prior to 1.5.17 and Pivotal Cloud Foundry Elastic Runtime 1.6.x versions prior to 1.6.18 do not properly enforce disk quotas in certain cases. An attacker could use an improper disk quota value to bypass enforcement and consume all the disk on DEAs/CELLs causing a potential denial of service for other applications." }, { "lang": "es", "value": "Se detect\u00f3 que cf-release versi\u00f3n v231 e inferior, Pivotal Cloud Foundry Elastic Runtime versiones 1.5.x anteriores a 1.5.17 y Pivotal Cloud Foundry Elastic Runtime versiones 1.6.x anteriores a 1.6.18, no hacen cumplir las cuotas de disco apropiadamente en ciertos casos. Un atacante podr\u00eda usar un valor de cuota de disco inapropiado para omitir la ejecuci\u00f3n y consumo de todo el disco en DEAs/CELLs, causando una potencial denegaci\u00f3n de servicio para otras aplicaciones." } ], "id": "CVE-2016-0780", "lastModified": "2024-11-21T02:42:22.113", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-05-25T17:29:00.520", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2016-0780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2016-0780" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-08-31 14:29
Modified
2024-11-21 02:42
Severity ?
Summary
Gorouter in Cloud Foundry cf-release v141 through v228 allows man-in-the-middle attackers to conduct cross-site scripting (XSS) attacks via vectors related to modified requests.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:141:*:*:*:*:*:*:*", "matchCriteriaId": "A729D0E4-FC0D-46CF-B3A8-DED46A93EE75", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:142:*:*:*:*:*:*:*", "matchCriteriaId": "51E59479-081C-4459-A345-1A91DABE846C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:143:*:*:*:*:*:*:*", "matchCriteriaId": "8697FE62-75DE-44B9-9DC0-A29AAD8CF0B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:144:*:*:*:*:*:*:*", "matchCriteriaId": "72650C54-A5DF-4A52-B7CE-1E00C4D2A42B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:145:*:*:*:*:*:*:*", "matchCriteriaId": "93DB1ECD-9BF1-46D8-89FD-DE8C251199FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:146:*:*:*:*:*:*:*", "matchCriteriaId": "D2A27B69-C44A-4273-89BD-75785530F713", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:147:*:*:*:*:*:*:*", "matchCriteriaId": "DFA680CE-C6F6-4533-9AC4-2B6FF2CFD3B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:148:*:*:*:*:*:*:*", "matchCriteriaId": "F79D4CAB-0223-48C5-AE1E-8C828263E185", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:149:*:*:*:*:*:*:*", "matchCriteriaId": "8A170C9D-946F-4306-9FD4-022EED9D98BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:150:*:*:*:*:*:*:*", "matchCriteriaId": "83E15CCF-E4EA-4083-B435-08CE0744F474", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:151:*:*:*:*:*:*:*", "matchCriteriaId": "9955087F-192B-4C3C-A4B7-B2C83172FC04", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:152:*:*:*:*:*:*:*", "matchCriteriaId": "96263C02-C52C-4555-8688-E989C802BBF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:153:*:*:*:*:*:*:*", "matchCriteriaId": "CC1410E2-AAED-4E38-BEDA-E97498FC24D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:154:*:*:*:*:*:*:*", "matchCriteriaId": "A6272077-5F21-4904-97BF-831E1F352BED", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:155:*:*:*:*:*:*:*", "matchCriteriaId": "99164C13-7419-451B-9AA8-89CCC62AAD20", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:156:*:*:*:*:*:*:*", "matchCriteriaId": "6F629B60-FB2F-47A6-B0C9-2F9C4E1F9B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:157:*:*:*:*:*:*:*", "matchCriteriaId": "ACCD1603-F782-46C4-9210-114BB6B2BE65", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:158:*:*:*:*:*:*:*", "matchCriteriaId": "E80C371A-AFDA-4536-960C-F9DE912AD5DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:159:*:*:*:*:*:*:*", "matchCriteriaId": "AC0602FF-6A1C-42AE-8ED6-A4557213B69E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:160:*:*:*:*:*:*:*", "matchCriteriaId": "98505082-55AD-4AE4-AEC5-358A9178AB1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:161:*:*:*:*:*:*:*", "matchCriteriaId": "78604894-4A2A-4C4C-A41D-19B5523C4D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:162:*:*:*:*:*:*:*", "matchCriteriaId": "96B59BF0-5451-4FEE-B4DB-703FB55CC2A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:163:*:*:*:*:*:*:*", "matchCriteriaId": "49C93E22-F698-4781-BB62-6B48A6304ABD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:164:*:*:*:*:*:*:*", "matchCriteriaId": "C2DDECC1-47A3-4F1C-BFFF-69E35BEF0AFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:165:*:*:*:*:*:*:*", "matchCriteriaId": "DAAE0E5F-6A65-4F8D-96E5-49323D20994D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:166:*:*:*:*:*:*:*", "matchCriteriaId": "A2F3624F-84B2-44AB-B96A-0F59D20B3D85", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:167:*:*:*:*:*:*:*", "matchCriteriaId": "ACF64E0F-E876-4279-8793-55806288AB44", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:168:*:*:*:*:*:*:*", "matchCriteriaId": "855D6E66-6554-4596-AC6F-FE96936616BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:169:*:*:*:*:*:*:*", "matchCriteriaId": "EA66A295-802F-4E1D-A413-68541BE40CB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:170:*:*:*:*:*:*:*", "matchCriteriaId": "610754F1-B81B-4BB1-9859-5F5AEB6310D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:171:*:*:*:*:*:*:*", "matchCriteriaId": "519B1106-E689-4675-AF81-4077BFCE92CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:172:*:*:*:*:*:*:*", "matchCriteriaId": "C58C1868-DF5B-4EF5-801A-8501ADF5AAB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:173:*:*:*:*:*:*:*", "matchCriteriaId": "321F6B06-07C7-478A-B365-E990B998ED69", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:174:*:*:*:*:*:*:*", "matchCriteriaId": "39289CC0-5172-4E15-A0FE-759249A30471", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:175:*:*:*:*:*:*:*", "matchCriteriaId": "E8835042-AAC9-4D97-94B2-C5EB13554F3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:176:*:*:*:*:*:*:*", "matchCriteriaId": "A0077FE7-FF4F-4B0B-AAF9-086BDB3C30B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:177:*:*:*:*:*:*:*", "matchCriteriaId": "75C79234-DBDC-41FC-9F45-4164C0E0DB7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:178:*:*:*:*:*:*:*", "matchCriteriaId": "C832B725-7E72-4501-A56A-14E165781498", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:179:*:*:*:*:*:*:*", "matchCriteriaId": "DAA65A9D-DFE8-4D49-BD75-3D27C5D1BA44", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:180:*:*:*:*:*:*:*", "matchCriteriaId": "2D848D46-C448-414C-89C6-B4F4159496C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:181:*:*:*:*:*:*:*", "matchCriteriaId": "0D3A4449-22E9-42B8-AD21-22D2EC48CFE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:182:*:*:*:*:*:*:*", "matchCriteriaId": "F3B2A623-31C3-419C-AFC1-5716BBFA927A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:183:*:*:*:*:*:*:*", "matchCriteriaId": "0389F99C-0233-4F7C-9F1B-B48D21AB4595", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:184:*:*:*:*:*:*:*", "matchCriteriaId": "48763170-7C22-4BA3-BB0E-6BDDA5DA6B61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:185:*:*:*:*:*:*:*", "matchCriteriaId": "699DAA6D-4844-47C0-8F6C-92E24F98478F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:186:*:*:*:*:*:*:*", "matchCriteriaId": "CDAA4421-463F-47E9-A456-CA651636CE14", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:187:*:*:*:*:*:*:*", "matchCriteriaId": "6C581A75-F035-4916-A13A-7E98E388B690", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:188:*:*:*:*:*:*:*", "matchCriteriaId": "D9DC51B4-3727-453A-8325-398A7E0F865B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:189:*:*:*:*:*:*:*", "matchCriteriaId": "31F4290F-B2FC-4331-B513-BCB1F50C9F42", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:190:*:*:*:*:*:*:*", "matchCriteriaId": "5596A1B8-B287-4C50-ADEE-AD516EE4260E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:191:*:*:*:*:*:*:*", "matchCriteriaId": "58C8CA84-5078-4941-ADE9-8681B5A026C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:192:*:*:*:*:*:*:*", "matchCriteriaId": "4F6335E8-D1A7-4A3A-B59D-7D05FBDB17F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:193:*:*:*:*:*:*:*", "matchCriteriaId": "CE2C1D09-4349-400F-8022-66EB9667E884", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:194:*:*:*:*:*:*:*", "matchCriteriaId": "661B8901-458A-4549-A630-48AD730F853F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:195:*:*:*:*:*:*:*", "matchCriteriaId": "57A884D6-06CF-42F8-B9EB-14043F65E4EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:196:*:*:*:*:*:*:*", "matchCriteriaId": "9A37F69A-E529-41C1-8CF4-4C1E8F7E0125", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:197:*:*:*:*:*:*:*", "matchCriteriaId": "D9D07EA0-A11E-4987-8C1D-FB3D99DCEB03", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:198:*:*:*:*:*:*:*", "matchCriteriaId": "4060C9CE-6168-4CE1-BB0A-74B2ACF1E0CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:199:*:*:*:*:*:*:*", "matchCriteriaId": "902DA3CC-72B7-461A-B921-D743A848984D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:200:*:*:*:*:*:*:*", "matchCriteriaId": "7504B5A3-3497-4CF9-8A79-280B7F7EC637", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:201:*:*:*:*:*:*:*", "matchCriteriaId": "746BCCDA-0A32-4A36-B84A-D5F45267B8D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:202:*:*:*:*:*:*:*", "matchCriteriaId": "17C2C5DB-2A64-4619-BC7F-7418DE0395C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:203:*:*:*:*:*:*:*", "matchCriteriaId": "8A81EF04-6CC2-44CF-9846-6C56065A01A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:204:*:*:*:*:*:*:*", "matchCriteriaId": "EF059737-8DA3-449D-A146-2417399D190A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:205:*:*:*:*:*:*:*", "matchCriteriaId": "1B4F7ACD-3375-41AB-8B82-638ED6C5650A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:206:*:*:*:*:*:*:*", "matchCriteriaId": "A4FD01C3-2BFD-4D84-A1EB-963471C9F004", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:207:*:*:*:*:*:*:*", "matchCriteriaId": "85F15FBD-B2C1-45FF-A457-C9FA94377B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:208:*:*:*:*:*:*:*", "matchCriteriaId": "C297F58C-0322-46D5-B083-11CC8C44266F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:209:*:*:*:*:*:*:*", "matchCriteriaId": "44650561-88FD-4962-A5FC-44E972627E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:210:*:*:*:*:*:*:*", "matchCriteriaId": "AF2497AE-DA57-43EC-AC88-46586E4A99DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:211:*:*:*:*:*:*:*", "matchCriteriaId": "32EAE926-2BCC-4D1A-A759-D568E7A2E1DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:212:*:*:*:*:*:*:*", "matchCriteriaId": "B1FDC13B-8ECC-41F6-9BA6-3BC55F1440CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:213:*:*:*:*:*:*:*", "matchCriteriaId": "764AC325-E85C-4C3D-87EC-30DA4FA0187D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:214:*:*:*:*:*:*:*", "matchCriteriaId": "36081E6B-B90E-45C5-ABEB-267B226FAFCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:215:*:*:*:*:*:*:*", "matchCriteriaId": "ACAF3F6A-4AC3-48A2-9563-A3D7B66D2706", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:216:*:*:*:*:*:*:*", "matchCriteriaId": "52DF964B-385C-4B39-96F8-89627F890FB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:217:*:*:*:*:*:*:*", "matchCriteriaId": "094745DD-E63B-49C4-9A8D-CCC471D17D28", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:218:*:*:*:*:*:*:*", "matchCriteriaId": "16D490A8-EED7-4AAC-A3E9-A9ACC7E1EB65", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:219:*:*:*:*:*:*:*", "matchCriteriaId": "9A12F3F7-969F-41B8-AFBD-F89014A040B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:220:*:*:*:*:*:*:*", "matchCriteriaId": "16419C47-6315-4D43-946E-70A9B4D4A3E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:221:*:*:*:*:*:*:*", "matchCriteriaId": "530104BB-FADD-41A2-B3AD-C365E4D68110", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:222:*:*:*:*:*:*:*", "matchCriteriaId": "4F4D893C-8C07-472E-9D99-0C30365930E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:223:*:*:*:*:*:*:*", "matchCriteriaId": "10328933-CBD1-43D6-9951-2860FC57CFCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:224:*:*:*:*:*:*:*", "matchCriteriaId": "24A02A6C-75DD-44AE-8D79-76A2D4F351DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:225:*:*:*:*:*:*:*", "matchCriteriaId": "CF2F1FF7-E52E-4C1B-A85D-995E326F6AA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:226:*:*:*:*:*:*:*", "matchCriteriaId": "3BF54F3B-EB88-499A-BCB9-76574DB0A1F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:227:*:*:*:*:*:*:*", "matchCriteriaId": "0460E58E-64A6-4861-85EB-3C8644A66ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:228:*:*:*:*:*:*:*", "matchCriteriaId": "07B6953E-8FC0-409F-A6CB-43BDE8CEE50A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Gorouter in Cloud Foundry cf-release v141 through v228 allows man-in-the-middle attackers to conduct cross-site scripting (XSS) attacks via vectors related to modified requests." }, { "lang": "es", "value": "Gorouter en Cloud Foundry cf-release v141 a v228 permite que los atacantes Man-in-the-Middle (MitM) realicen ataques Cross-Site Scripting (XSS) mediante vectores relacionados con peticiones modificadas." } ], "id": "CVE-2016-0713", "lastModified": "2024-11-21T02:42:14.237", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-31T14:29:00.197", "references": [ { "source": "secalert@redhat.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://bosh.io/releases/github.com/cloudfoundry/cf-release?version=229" }, { "source": "secalert@redhat.com", "url": "https://lists.cloudfoundry.org/archives/list/cf-dev%40lists.cloudfoundry.org/thread/VWDLUNTDKW5CW5JWEM5BOHLJ3J32TAFF/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://bosh.io/releases/github.com/cloudfoundry/cf-release?version=229" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.cloudfoundry.org/archives/list/cf-dev%40lists.cloudfoundry.org/thread/VWDLUNTDKW5CW5JWEM5BOHLJ3J32TAFF/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-05-25 17:29
Modified
2024-11-21 02:47
Severity ?
Summary
The Loggregator Traffic Controller endpoints in cf-release v231 and lower, Pivotal Elastic Runtime versions prior to 1.5.19 AND 1.6.x versions prior to 1.6.20 are not cleansing request URL paths when they are invalid and are returning them in the 404 response. This could allow malicious scripts to be written directly into the 404 response.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://pivotal.io/security/cve-2016-2165 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://pivotal.io/security/cve-2016-2165 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FA3664A-60D8-4339-8021-9D6966427DAC", "versionEndIncluding": "231", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "09AC8F12-A0E9-47E4-9F0F-A8168B825393", "versionEndIncluding": "1.5.18", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CC5918-BC38-46E3-8000-5FE87A65C0E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "36926681-35F4-4619-9613-155DEEEA3C8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "41FF3C2B-E96F-4DF7-A5C4-703206CB729E", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "F9CB3C2D-3080-4A3D-8D8D-1381B5D98920", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "782781EB-147C-4B00-84C5-1D8443BFA2D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "35A56755-EEB2-4C93-B180-3918A36965AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "E4009F10-08AF-470B-B903-38B8A6DBF332", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "2B2E8F04-53E6-4A3C-BE4B-8D0DDA22CA8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "790DAB24-893A-463F-8358-171DACD75074", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "3645A1A8-4945-447F-A968-101D5938F9C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "0E52C9B9-8F94-48D8-ADA6-96918F6AAD36", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "3948FC2F-AF3B-4AF3-968D-F124D03A213A", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "4BA44F9B-97D5-48C0-91E9-6D3FEC8B7773", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "7B414F88-6541-48C6-B9D6-4DDA035A0037", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "66235C7F-D5EE-4989-8D24-6D0781954234", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "12E75B49-2419-4313-A648-B5283DA620E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "EED70273-3FB2-4652-9AA2-10E2E9D581DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "A2C07910-C462-46C1-83CB-39B3FD8D25BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "C6B9243E-31EF-48AB-BAB5-CCC3704A219F", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "2BCB1D4B-F44C-41A1-90CA-62FD37003A1F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Loggregator Traffic Controller endpoints in cf-release v231 and lower, Pivotal Elastic Runtime versions prior to 1.5.19 AND 1.6.x versions prior to 1.6.20 are not cleansing request URL paths when they are invalid and are returning them in the 404 response. This could allow malicious scripts to be written directly into the 404 response." }, { "lang": "es", "value": "Los endpoints de Loggregator Traffic Controller en cf-release versiones v231 e inferiores, Pivotal Elastic Runtime anteriores a 1.5.19 y versiones 1.6.x anteriores a 1.6.20, no est\u00e1n limpiando las rutas (path) URL de petici\u00f3n cuando no son v\u00e1lidas y son devueltas en la respuesta 404 . Esto podr\u00eda permitir que los scripts maliciosos se escriban directamente en la respuesta 404." } ], "id": "CVE-2016-2165", "lastModified": "2024-11-21T02:47:56.467", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-05-25T17:29:00.600", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2016-2165" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2016-2165" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-10-24 17:29
Modified
2024-11-21 02:32
Severity ?
Summary
Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact via vectors involving emails with password recovery links, aka "Cross Domain Referer Leakage."
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://pivotal.io/security/cve-2015-5170-5173 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://pivotal.io/security/cve-2015-5170-5173 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | cf-release | * | |
pivotal_software | cloud_foundry_elastic_runtime | * | |
pivotal_software | cloud_foundry_uaa | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E39C984-9592-4C18-A220-F3BF2FF0E4D3", "versionEndExcluding": "216", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "349BBE7C-CB38-4F96-B42C-03982C4D6071", "versionEndExcluding": "1.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FF9860B-08BA-42CA-A3C0-34BE821C47B2", "versionEndExcluding": "2.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact via vectors involving emails with password recovery links, aka \"Cross Domain Referer Leakage.\"" }, { "lang": "es", "value": "Cloud Foundry Runtime cf-release en versiones anteriores a la 216, UAA en versiones anteriores a la 2.5.2 y Pivotal Cloud Foundry (PCF) Elastic Runtime en versiones anteriores a la 1.7.0 permite que los atacantes causen un impacto no especificado mediante vectores que involucren emails con enlaces de recuperaci\u00f3n de contrase\u00f1as. Esta vulnerabilidad tambi\u00e9n se conoce como \"Cross Domain Referer Leakage\"." } ], "id": "CVE-2015-5173", "lastModified": "2024-11-21T02:32:29.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-24T17:29:00.290", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2015-5170-5173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2015-5170-5173" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-06-13 06:29
Modified
2024-11-21 02:59
Severity ?
Summary
An issue was discovered in Cloud Foundry Foundation routing-release versions prior to 0.142.0 and cf-release versions 203 to 231. Incomplete validation logic in JSON Web Token (JWT) libraries can allow unprivileged attackers to impersonate other users to the routing API, aka an "Unauthenticated JWT signing algorithm in routing" issue.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://www.cloudfoundry.org/cve-2016-8218/ | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cloudfoundry.org/cve-2016-8218/ | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | cf-release | * | |
cloudfoundry | cf-release | 204 | |
cloudfoundry | cf-release | 205 | |
cloudfoundry | cf-release | 206 | |
cloudfoundry | cf-release | 207 | |
cloudfoundry | cf-release | 208 | |
cloudfoundry | cf-release | 209 | |
cloudfoundry | cf-release | 210 | |
cloudfoundry | cf-release | 211 | |
cloudfoundry | cf-release | 212 | |
cloudfoundry | cf-release | 213 | |
cloudfoundry | cf-release | 214 | |
cloudfoundry | cf-release | 215 | |
cloudfoundry | cf-release | 217 | |
cloudfoundry | cf-release | 218 | |
cloudfoundry | cf-release | 219 | |
cloudfoundry | cf-release | 220 | |
cloudfoundry | cf-release | 221 | |
cloudfoundry | cf-release | 222 | |
cloudfoundry | cf-release | 223 | |
cloudfoundry | cf-release | 224 | |
cloudfoundry | cf-release | 225 | |
cloudfoundry | cf-release | 226 | |
cloudfoundry | cf-release | 227 | |
cloudfoundry | cf-release | 228 | |
cloudfoundry | cf-release | 229 | |
cloudfoundry | cf-release | 230 | |
cloudfoundry | cf-release | 231 | |
cloudfoundry | routing-release | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6716274-498C-4038-AF3A-12E28D2182FE", "versionEndIncluding": "203", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:204:*:*:*:*:*:*:*", "matchCriteriaId": "EF059737-8DA3-449D-A146-2417399D190A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:205:*:*:*:*:*:*:*", "matchCriteriaId": "1B4F7ACD-3375-41AB-8B82-638ED6C5650A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:206:*:*:*:*:*:*:*", "matchCriteriaId": "A4FD01C3-2BFD-4D84-A1EB-963471C9F004", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:207:*:*:*:*:*:*:*", "matchCriteriaId": "85F15FBD-B2C1-45FF-A457-C9FA94377B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:208:*:*:*:*:*:*:*", "matchCriteriaId": "C297F58C-0322-46D5-B083-11CC8C44266F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:209:*:*:*:*:*:*:*", "matchCriteriaId": "44650561-88FD-4962-A5FC-44E972627E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:210:*:*:*:*:*:*:*", "matchCriteriaId": "AF2497AE-DA57-43EC-AC88-46586E4A99DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:211:*:*:*:*:*:*:*", "matchCriteriaId": "32EAE926-2BCC-4D1A-A759-D568E7A2E1DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:212:*:*:*:*:*:*:*", "matchCriteriaId": "B1FDC13B-8ECC-41F6-9BA6-3BC55F1440CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:213:*:*:*:*:*:*:*", "matchCriteriaId": "764AC325-E85C-4C3D-87EC-30DA4FA0187D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:214:*:*:*:*:*:*:*", "matchCriteriaId": "36081E6B-B90E-45C5-ABEB-267B226FAFCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:215:*:*:*:*:*:*:*", "matchCriteriaId": "ACAF3F6A-4AC3-48A2-9563-A3D7B66D2706", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:217:*:*:*:*:*:*:*", "matchCriteriaId": "094745DD-E63B-49C4-9A8D-CCC471D17D28", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:218:*:*:*:*:*:*:*", "matchCriteriaId": "16D490A8-EED7-4AAC-A3E9-A9ACC7E1EB65", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:219:*:*:*:*:*:*:*", "matchCriteriaId": "9A12F3F7-969F-41B8-AFBD-F89014A040B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:220:*:*:*:*:*:*:*", "matchCriteriaId": "16419C47-6315-4D43-946E-70A9B4D4A3E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:221:*:*:*:*:*:*:*", "matchCriteriaId": "530104BB-FADD-41A2-B3AD-C365E4D68110", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:222:*:*:*:*:*:*:*", "matchCriteriaId": "4F4D893C-8C07-472E-9D99-0C30365930E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:223:*:*:*:*:*:*:*", "matchCriteriaId": "10328933-CBD1-43D6-9951-2860FC57CFCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:224:*:*:*:*:*:*:*", "matchCriteriaId": "24A02A6C-75DD-44AE-8D79-76A2D4F351DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:225:*:*:*:*:*:*:*", "matchCriteriaId": "CF2F1FF7-E52E-4C1B-A85D-995E326F6AA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:226:*:*:*:*:*:*:*", "matchCriteriaId": "3BF54F3B-EB88-499A-BCB9-76574DB0A1F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:227:*:*:*:*:*:*:*", "matchCriteriaId": "0460E58E-64A6-4861-85EB-3C8644A66ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:228:*:*:*:*:*:*:*", "matchCriteriaId": "07B6953E-8FC0-409F-A6CB-43BDE8CEE50A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:229:*:*:*:*:*:*:*", "matchCriteriaId": "DE241E51-62CA-4BDD-9A7F-B23BEEF97844", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:230:*:*:*:*:*:*:*", "matchCriteriaId": "0ACC6310-4125-4DC3-943B-9494A8D5ECBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:231:*:*:*:*:*:*:*", "matchCriteriaId": "DBA563A9-3C12-4F83-9E63-BC03636BC799", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:routing-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "C652BD1E-FCE0-4B3C-844F-5EB4251C408F", "versionEndIncluding": "0.141.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation routing-release versions prior to 0.142.0 and cf-release versions 203 to 231. Incomplete validation logic in JSON Web Token (JWT) libraries can allow unprivileged attackers to impersonate other users to the routing API, aka an \"Unauthenticated JWT signing algorithm in routing\" issue." }, { "lang": "es", "value": "Se detect\u00f3 un problema en routing-release anterior a versi\u00f3n 0.142.0 y cf-release versiones 203 a 231 de Cloud Foundry Foundation. La l\u00f3gica de comprobaci\u00f3n incompleta en las bibliotecas JSON Web Token (JWT) puede permitir a los atacantes sin privilegios suplantar a otros usuarios en la API de enrutamiento, tambi\u00e9n se conoce como un problema de \"Unauthenticated JWT signing algorithm in routing\"." } ], "id": "CVE-2016-8218", "lastModified": "2024-11-21T02:59:00.493", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-13T06:29:00.237", "references": [ { "source": "security_alert@emc.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2016-8218/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2016-8218/" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-06-13 06:29
Modified
2024-11-21 03:26
Severity ?
Summary
An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v261; UAA release 2.x versions prior to v2.7.4.17, 3.6.x versions prior to v3.6.11, 3.9.x versions prior to v3.9.13, and other versions prior to v4.2.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.15, 24.x versions prior to v24.10, 30.x versions prior to 30.3, and other versions prior to v37. There is privilege escalation (arbitrary password reset) with user invitations.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://www.cloudfoundry.org/cve-2017-4992/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cloudfoundry.org/cve-2017-4992/ | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "07F2F02B-1414-4B6A-A544-F00AD397DDB1", "versionEndIncluding": "260", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBEB6BD4-9D92-4338-8771-A499AC417423", "versionEndIncluding": "27", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "C24E2CE5-6DBA-4B45-951D-0F7189C9A94D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "F0EB01AB-A033-4DCC-B433-0674078E31DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.3:*:*:*:*:*:*:*", "matchCriteriaId": "749B1CBF-6297-4F4D-970D-25D1D0A88AE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.4:*:*:*:*:*:*:*", "matchCriteriaId": "6C369E22-27DF-40B3-B94F-45DFC47E6A60", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.5:*:*:*:*:*:*:*", "matchCriteriaId": "15A2FE05-FC02-4FC1-B9B3-40E4EC62C5D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.6:*:*:*:*:*:*:*", "matchCriteriaId": "6A4975D0-2C4D-4883-A849-D434FB8A7E2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.7:*:*:*:*:*:*:*", "matchCriteriaId": "6E85B347-27E2-4EF9-9CF0-13902EC4741D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.8:*:*:*:*:*:*:*", "matchCriteriaId": "93081AC1-C07E-4E6D-8B1E-8D561461FEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.9:*:*:*:*:*:*:*", "matchCriteriaId": "E4F6208B-7FA5-4177-8942-2037BEE99546", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.10:*:*:*:*:*:*:*", "matchCriteriaId": "FD8DA4C6-BCA9-4959-82FC-2596C6EBD6E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.11:*:*:*:*:*:*:*", "matchCriteriaId": "8120A442-6A3D-4918-A829-A84B2B9694E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.12:*:*:*:*:*:*:*", "matchCriteriaId": "9D7AF658-FFBB-49AB-8A44-9989A7FEC707", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.13:*:*:*:*:*:*:*", "matchCriteriaId": "BC42F184-AFEC-4992-BFEF-B410CDF1452A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.14:*:*:*:*:*:*:*", "matchCriteriaId": "147C8C7B-F6C6-4338-A181-BF450C53C14B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24:*:*:*:*:*:*:*", "matchCriteriaId": "A090F790-1A28-4238-8727-3F9475706A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.1:*:*:*:*:*:*:*", "matchCriteriaId": "AEFE0727-C152-4726-A70E-C75BACD31071", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.2:*:*:*:*:*:*:*", "matchCriteriaId": "38D708B8-485D-445E-8A21-474A500F1184", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.3:*:*:*:*:*:*:*", "matchCriteriaId": "E4B8A221-8740-4D35-871D-EABDB2F8332D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.4:*:*:*:*:*:*:*", "matchCriteriaId": "A426C1DD-0C64-468A-B96E-B0B94FFF0A89", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.5:*:*:*:*:*:*:*", "matchCriteriaId": "DEFEEACE-5BED-4507-A770-69D36F478791", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.6:*:*:*:*:*:*:*", "matchCriteriaId": "860B073C-AC50-473C-9650-7421F3638FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.7:*:*:*:*:*:*:*", "matchCriteriaId": "1B44C3F2-5AC4-4D05-BAF0-EFDFB3FDC3BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.8:*:*:*:*:*:*:*", "matchCriteriaId": "C2BBC265-7026-469B-BB30-D7DB7A334A65", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.9:*:*:*:*:*:*:*", "matchCriteriaId": "08E99F4C-6BB5-415E-A5F3-285A3219EEF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:30:*:*:*:*:*:*:*", "matchCriteriaId": "75D365CB-5BDA-4387-AA3E-2F02B552162F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:30.1:*:*:*:*:*:*:*", "matchCriteriaId": "E80E3184-345D-4C78-ABAA-94B3D9A53252", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:30.2:*:*:*:*:*:*:*", "matchCriteriaId": "5F654A04-B949-415D-982A-7341486B2B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF552C5A-2298-43F4-AF70-20E9E4B402D4", "versionEndIncluding": "4.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "942E59F5-172F-4802-81AE-D43E72189889", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDEF8D-9BE5-43ED-8E1D-2B63A1294EDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "504AA7E0-D1F5-4097-B53B-F0E36328B1EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "0DCD6CB7-5D49-4897-8353-44E5B08D9375", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "B1B4C4EB-3337-4053-BA4B-93A849263A42", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9339A684-B1F0-4110-9E48-A04BED74DC2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "F35CCB74-63A3-4F95-9EAE-ADC5A8BACB99", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "A2A1BAE9-FCB6-458E-A1A6-03F0AB742E5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "2261C887-8179-4BBA-A2CF-174F8F3017FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "6EED2616-E58D-4604-BBBC-AC24BCA068A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "916733EA-F51A-49E2-9D47-9B713B36C847", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA1887F9-EB71-41AE-9E45-DD86A54AA958", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "E7D01A32-98DA-4F7F-B7A0-D1695478C208", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "4C57AACB-1ECA-4047-A8AA-D768DA54BB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "6D164FF1-D85D-4800-A726-465A32974BEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "6CAC5B15-895E-43CA-AFE1-EE7E06EF08D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "10286C78-A413-4FD3-B7F7-39C17A50D75C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "8D022F9B-4877-4A97-AE22-BAF579B38DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "87D2BF0D-963C-430F-A4FE-F452F15035BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "6D8C3C5E-E942-483A-A914-CC57DDCB6EAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "D741750F-DC85-4701-90F7-4AE00DB04B0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "E126E318-6572-4BC3-8FA4-835AC49432C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "3A5B622B-C14C-4160-ACFD-CD2AB3786828", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "EBE0A85A-5B1A-49E0-8FC7-4A68505B6506", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "A8E3CEAB-E58E-4870-A719-F46D6DE2E710", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "3DEDD149-4BBB-47A1-8E23-2247DCF9C13C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "225B90A0-757D-4406-9EC1-A31968CC7F87", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "FC8157B8-A26B-4148-A02A-DBEC662FE701", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "3F74AEAE-D823-4B1A-9979-0739F6BA17CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "21FC35CD-79D1-4279-B719-6398C6636113", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6955DB34-FA12-41A6-A90F-456777ADEB81", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B92D875-509C-42BE-90E4-112C94170199", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "166C908D-7D5F-43DD-B3EA-BAFF23DBBDAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "6B83917A-D326-4874-AD82-0DBD131DC0EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "C5C19F44-AB0F-44BB-A298-F81B853FA71D", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "B981590F-0649-4BBA-AB5F-CC5C7858DFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "1A36B9F9-6D45-4D84-869A-25131BF482BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "FADC5C69-1910-4D19-97B2-B44A594B8B34", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "B5314895-961D-4D2B-A0C9-1B23C03317CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "DA5A5B1C-7111-464E-9F49-D13621233AC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "1A6E52B8-7635-4376-AFAD-935DB44B923C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.12:*:*:*:*:*:*:*", "matchCriteriaId": "C97CB502-CE1E-4B63-88D0-7A826C825B84", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "4F3AAD33-275B-4FF1-9434-BEE85543F7B3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v261; UAA release 2.x versions prior to v2.7.4.17, 3.6.x versions prior to v3.6.11, 3.9.x versions prior to v3.9.13, and other versions prior to v4.2.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.15, 24.x versions prior to v24.10, 30.x versions prior to 30.3, and other versions prior to v37. There is privilege escalation (arbitrary password reset) with user invitations." }, { "lang": "es", "value": "Se detect\u00f3 un problema en cf-release versiones anteriores a 261; UAA release versiones 2.x anteriores a 2.7.4.17, versiones 3.6.x anteriores a 3.6.11, versiones 3.9.x anteriores a 3.9.13, y otras versiones anteriores a 4.2.0; y UAA bosh release (uaa-release) versiones 13.x anteriores a 13.15, versiones 24.x anteriores a 24.10, versiones 30.x anteriores a 30.3 y otras versiones anteriores a 37 de Cloud Foundry Foundation. Se presenta una escalada de privilegios (restablecimiento arbitrario de contrase\u00f1a) con invitaciones de usuario." } ], "id": "CVE-2017-4992", "lastModified": "2024-11-21T03:26:49.327", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-13T06:29:00.770", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-4992/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-4992/" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-10-04 01:29
Modified
2024-11-21 03:33
Severity ?
Summary
In Cloud Foundry router routing-release all versions prior to v0.163.0 and cf-release all versions prior to v274, in some applications, it is possible to append a combination of characters to the URL that will allow for an open redirect. An attacker could exploit this as a phishing attack to gain access to user credentials or other sensitive data. NOTE: 274 resolves the vulnerability but has a serious bug that is fixed in 275.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://www.cloudfoundry.org/cve-2017-8047/ | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cloudfoundry.org/cve-2017-8047/ | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | cf-release | * | |
pivotal | routing-release | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAEB1B88-D592-419C-9244-F8BA5762BBA9", "versionEndIncluding": "273", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:routing-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "166C3DF7-422B-4C02-8352-CD62B7FEE368", "versionEndIncluding": "0.162.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Cloud Foundry router routing-release all versions prior to v0.163.0 and cf-release all versions prior to v274, in some applications, it is possible to append a combination of characters to the URL that will allow for an open redirect. An attacker could exploit this as a phishing attack to gain access to user credentials or other sensitive data. NOTE: 274 resolves the vulnerability but has a serious bug that is fixed in 275." }, { "lang": "es", "value": "En todas las versiones anteriores a la 0.163.0 del desarrollo routing-release y en todas las versiones anteriores a la 274 del desarrollo cf-release de los router de Cloud Foundry, es posible a\u00f1adir una combinaci\u00f3n de caracteres en la URL que permitir\u00e1 una redirecci\u00f3n abierta. Un atacante podr\u00eda explotar esta vulnerabilidad con un ataque de phishing para obtener acceso a las credenciales de usuario y otros datos sensibles. NOTA: 274 resuelve la vulnerabilidad pero tiene un error grave que se resuelve en 275." } ], "id": "CVE-2017-8047", "lastModified": "2024-11-21T03:33:12.897", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-04T01:29:03.620", "references": [ { "source": "security_alert@emc.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-8047/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-8047/" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-05-25 17:29
Modified
2024-11-21 02:28
Severity ?
Summary
With Cloud Foundry Runtime cf-release versions v209 or earlier, UAA Standalone versions 2.2.6 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier the UAA logout link is susceptible to an open redirect which allows an attacker to insert malicious web page as a redirect parameter.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://pivotal.io/security/cve-2015-3190 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://pivotal.io/security/cve-2015-3190 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | cf-release | * | |
pivotal_software | cloud_foundry_elastic_runtime | * | |
pivotal_software | cloud_foundry_uaa | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "D648E4CC-C6C7-4C5C-B554-528D4DBDC079", "versionEndIncluding": "209", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB6812A0-8836-4F25-9AC1-DB552BC605ED", "versionEndIncluding": "1.4.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7981BF0-D4AF-4E06-96DE-725FE2D581A5", "versionEndIncluding": "2.2.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "With Cloud Foundry Runtime cf-release versions v209 or earlier, UAA Standalone versions 2.2.6 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier the UAA logout link is susceptible to an open redirect which allows an attacker to insert malicious web page as a redirect parameter." }, { "lang": "es", "value": "En Cloud Foundry Runtime versiones v209 o anteriores, UAA Standalone versiones 2.2.6 o ateriores y Pivotal Cloud Foundry Runtime versiones 1.4.5 o anteriores, el enlace del UAA logout es susceptible a una redirecci\u00f3n abierta que permitir\u00eda a un atacante insertar p\u00e1ginas web maliciosas en un par\u00e1metro de redirecci\u00f3n." } ], "id": "CVE-2015-3190", "lastModified": "2024-11-21T02:28:51.990", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-05-25T17:29:00.367", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2015-3190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2015-3190" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-06-13 06:29
Modified
2024-11-21 03:26
Severity ?
Summary
An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v257; UAA release 2.x versions prior to v2.7.4.14, 3.6.x versions prior to v3.6.8, 3.9.x versions prior to v3.9.10, and other versions prior to v3.15.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.12, 24.x versions prior to v24.7, and other versions prior to v30. An attacker can use a blind SQL injection attack to query the contents of the UAA database.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://www.cloudfoundry.org/cve-2017-4972/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cloudfoundry.org/cve-2017-4972/ | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FDE4333-E0BD-4DA7-9869-8739910BC4FA", "versionEndIncluding": "256", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:*:*:*:*:*:*:*:*", "matchCriteriaId": "68FCA5E2-87D1-400C-BF41-12E9C2A09F35", "versionEndIncluding": "29", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "C24E2CE5-6DBA-4B45-951D-0F7189C9A94D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "F0EB01AB-A033-4DCC-B433-0674078E31DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.3:*:*:*:*:*:*:*", "matchCriteriaId": "749B1CBF-6297-4F4D-970D-25D1D0A88AE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.4:*:*:*:*:*:*:*", "matchCriteriaId": "6C369E22-27DF-40B3-B94F-45DFC47E6A60", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.5:*:*:*:*:*:*:*", "matchCriteriaId": "15A2FE05-FC02-4FC1-B9B3-40E4EC62C5D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.6:*:*:*:*:*:*:*", "matchCriteriaId": "6A4975D0-2C4D-4883-A849-D434FB8A7E2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.7:*:*:*:*:*:*:*", "matchCriteriaId": "6E85B347-27E2-4EF9-9CF0-13902EC4741D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.8:*:*:*:*:*:*:*", "matchCriteriaId": "93081AC1-C07E-4E6D-8B1E-8D561461FEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.9:*:*:*:*:*:*:*", "matchCriteriaId": "E4F6208B-7FA5-4177-8942-2037BEE99546", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.10:*:*:*:*:*:*:*", "matchCriteriaId": "FD8DA4C6-BCA9-4959-82FC-2596C6EBD6E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.11:*:*:*:*:*:*:*", "matchCriteriaId": "8120A442-6A3D-4918-A829-A84B2B9694E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24:*:*:*:*:*:*:*", "matchCriteriaId": "A090F790-1A28-4238-8727-3F9475706A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.1:*:*:*:*:*:*:*", "matchCriteriaId": "AEFE0727-C152-4726-A70E-C75BACD31071", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.2:*:*:*:*:*:*:*", "matchCriteriaId": "38D708B8-485D-445E-8A21-474A500F1184", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.3:*:*:*:*:*:*:*", "matchCriteriaId": "E4B8A221-8740-4D35-871D-EABDB2F8332D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.4:*:*:*:*:*:*:*", "matchCriteriaId": "A426C1DD-0C64-468A-B96E-B0B94FFF0A89", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.5:*:*:*:*:*:*:*", "matchCriteriaId": "DEFEEACE-5BED-4507-A770-69D36F478791", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.6:*:*:*:*:*:*:*", "matchCriteriaId": "860B073C-AC50-473C-9650-7421F3638FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:30:*:*:*:*:*:*:*", "matchCriteriaId": "75D365CB-5BDA-4387-AA3E-2F02B552162F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:30.1:*:*:*:*:*:*:*", "matchCriteriaId": "E80E3184-345D-4C78-ABAA-94B3D9A53252", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:30.2:*:*:*:*:*:*:*", "matchCriteriaId": "5F654A04-B949-415D-982A-7341486B2B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:30.3:*:*:*:*:*:*:*", "matchCriteriaId": "CEF9F58F-1387-4D84-932F-8CC8F380E797", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:*:*:*:*:*:*:*:*", "matchCriteriaId": "28BE1352-3E37-4D04-A17F-04E7161DFCCF", "versionEndIncluding": "3.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "942E59F5-172F-4802-81AE-D43E72189889", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDEF8D-9BE5-43ED-8E1D-2B63A1294EDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "504AA7E0-D1F5-4097-B53B-F0E36328B1EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "0DCD6CB7-5D49-4897-8353-44E5B08D9375", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "B1B4C4EB-3337-4053-BA4B-93A849263A42", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9339A684-B1F0-4110-9E48-A04BED74DC2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "F35CCB74-63A3-4F95-9EAE-ADC5A8BACB99", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "A2A1BAE9-FCB6-458E-A1A6-03F0AB742E5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "2261C887-8179-4BBA-A2CF-174F8F3017FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "6EED2616-E58D-4604-BBBC-AC24BCA068A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "916733EA-F51A-49E2-9D47-9B713B36C847", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA1887F9-EB71-41AE-9E45-DD86A54AA958", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "E7D01A32-98DA-4F7F-B7A0-D1695478C208", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "4C57AACB-1ECA-4047-A8AA-D768DA54BB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "6D164FF1-D85D-4800-A726-465A32974BEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "6CAC5B15-895E-43CA-AFE1-EE7E06EF08D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "10286C78-A413-4FD3-B7F7-39C17A50D75C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "D741750F-DC85-4701-90F7-4AE00DB04B0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "E126E318-6572-4BC3-8FA4-835AC49432C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "3A5B622B-C14C-4160-ACFD-CD2AB3786828", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "EBE0A85A-5B1A-49E0-8FC7-4A68505B6506", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "A8E3CEAB-E58E-4870-A719-F46D6DE2E710", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "3DEDD149-4BBB-47A1-8E23-2247DCF9C13C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "225B90A0-757D-4406-9EC1-A31968CC7F87", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "FC8157B8-A26B-4148-A02A-DBEC662FE701", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "3F74AEAE-D823-4B1A-9979-0739F6BA17CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6955DB34-FA12-41A6-A90F-456777ADEB81", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B92D875-509C-42BE-90E4-112C94170199", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "166C908D-7D5F-43DD-B3EA-BAFF23DBBDAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "6B83917A-D326-4874-AD82-0DBD131DC0EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "C5C19F44-AB0F-44BB-A298-F81B853FA71D", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "B981590F-0649-4BBA-AB5F-CC5C7858DFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "1A36B9F9-6D45-4D84-869A-25131BF482BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "FADC5C69-1910-4D19-97B2-B44A594B8B34", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "B5314895-961D-4D2B-A0C9-1B23C03317CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.12:*:*:*:*:*:*:*", "matchCriteriaId": "C97CB502-CE1E-4B63-88D0-7A826C825B84", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "4F3AAD33-275B-4FF1-9434-BEE85543F7B3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v257; UAA release 2.x versions prior to v2.7.4.14, 3.6.x versions prior to v3.6.8, 3.9.x versions prior to v3.9.10, and other versions prior to v3.15.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.12, 24.x versions prior to v24.7, and other versions prior to v30. An attacker can use a blind SQL injection attack to query the contents of the UAA database." }, { "lang": "es", "value": "Se detect\u00f3 un problema en cf-release versiones anteriores a v257; UAA release versiones 2.x anteriores a v2.7.4.14, versiones 3.6.x anteriores a v3.6.8, versiones 3.9.x anteriores a v3.9.10, y otras versiones anteriores a v3.15.0; y UAA bosh release (uaa-release) versiones 13.x anteriores a v13.12, versiones 24.x anteriores a v24.7, y otras versiones anteriores a v30 de Cloud Foundry Foundation. Un atacante puede usar un ataque de inyecci\u00f3n de SQL a ciegas para consultar el contenido de la base de datos UAA." } ], "id": "CVE-2017-4972", "lastModified": "2024-11-21T03:26:46.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-13T06:29:00.627", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-4972/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-4972/" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-28 07:29
Modified
2024-11-21 03:12
Severity ?
Summary
An issue was discovered in Cloud Foundry Foundation capi-release (all versions prior to 1.45.0), cf-release (all versions prior to v280), and cf-deployment (all versions prior to v1.0.0). The Cloud Controller does not prevent space developers from creating subdomains to an already existing route that belongs to a different user in a different org and space, aka an "Application Subdomain Takeover."
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://www.cloudfoundry.org/cve-2017-14389/ | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cloudfoundry.org/cve-2017-14389/ | Issue Tracking, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | capi-release | * | |
cloudfoundry | cf-deployment | * | |
cloudfoundry | cf-release | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD7E701F-4E99-4ADB-997A-9F544E48B4F3", "versionEndExcluding": "1.45.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*", "matchCriteriaId": "477E4243-21F9-401B-8B99-0A328C28D1FB", "versionEndExcluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "9347168F-C207-45C8-B161-BD459A53AAE6", "versionEndExcluding": "280", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation capi-release (all versions prior to 1.45.0), cf-release (all versions prior to v280), and cf-deployment (all versions prior to v1.0.0). The Cloud Controller does not prevent space developers from creating subdomains to an already existing route that belongs to a different user in a different org and space, aka an \"Application Subdomain Takeover.\"" }, { "lang": "es", "value": "Se ha descubierto un problema en Cloud Foundry Foundation capi-release (todas las versiones anteriores a la 1.45.0), cf-release (todas las versiones anteriores a la v280) y cf-deployment (todas las versiones anteriores a la v1.0.0). Cloud Controller no evita que los desarrolladores de un espacio creen subdominios a una ruta que ya existe y que pertenece a un usuario diferente en una organizaci\u00f3n y un espacio diferentes. Esto tambi\u00e9n se conoce como \"Application Subdomain Takeover\"." } ], "id": "CVE-2017-14389", "lastModified": "2024-11-21T03:12:41.227", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-28T07:29:00.303", "references": [ { "source": "security_alert@emc.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-14389/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-14389/" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-04-20 22:59
Modified
2024-11-21 03:26
Severity ?
Summary
The Cloud Controller in Cloud Foundry cf-release versions prior to v255 allows authenticated developer users to exceed memory and disk quotas for tasks.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://www.cloudfoundry.org/cve-2017-4969/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cloudfoundry.org/cve-2017-4969/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | cf-release | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "E805734A-AACB-4AC1-B06F-D28D5FED2663", "versionEndIncluding": "254", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Cloud Controller in Cloud Foundry cf-release versions prior to v255 allows authenticated developer users to exceed memory and disk quotas for tasks." }, { "lang": "es", "value": "El Cloud Controller en Cloud Foundry cf-release en versiones anteriores a v255 permiten a los usuarios de desarrolladores autenticados superar las cuotas de memoria y disco para las tareas." } ], "id": "CVE-2017-4969", "lastModified": "2024-11-21T03:26:46.510", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-20T22:59:00.463", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-4969/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-4969/" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-10-24 17:29
Modified
2024-11-21 02:32
Severity ?
Summary
The password change functionality in Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire existing sessions.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://pivotal.io/security/cve-2015-5170-5173 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://pivotal.io/security/cve-2015-5170-5173 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | cf-release | * | |
pivotal_software | cloud_foundry_elastic_runtime | * | |
pivotal_software | cloud_foundry_uaa | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E39C984-9592-4C18-A220-F3BF2FF0E4D3", "versionEndExcluding": "216", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "349BBE7C-CB38-4F96-B42C-03982C4D6071", "versionEndExcluding": "1.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FF9860B-08BA-42CA-A3C0-34BE821C47B2", "versionEndExcluding": "2.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The password change functionality in Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire existing sessions." }, { "lang": "es", "value": "La funcionalidad de cambio de contrase\u00f1a en Cloud Foundry Runtime cf-release en versiones anteriores a la 216, UAA en versiones anteriores a la 2.5.2 y Pivotal Cloud Foundry (PCF) Elastic Runtime en versiones anteriores a la 1.7.0 permite que los atacantes causen un impacto no especificado aprovechando que no caducan las sesiones existentes." } ], "id": "CVE-2015-5171", "lastModified": "2024-11-21T02:32:29.670", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-24T17:29:00.230", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2015-5170-5173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2015-5170-5173" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-613" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-06-13 06:29
Modified
2024-11-21 02:59
Severity ?
Summary
An issue was discovered in Cloud Foundry Foundation cf-release versions prior to 250 and CAPI-release versions prior to 1.12.0. A user with the SpaceAuditor role is over-privileged with the ability to restage applications. This could cause application downtime if the restage fails.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://www.cloudfoundry.org/cve-2016-8219/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cloudfoundry.org/cve-2016-8219/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | capi-release | * | |
cloudfoundry | cf-release | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "C599AC5E-A829-456A-A940-5AE7343D0EE6", "versionEndExcluding": "1.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DC01F1A-0B5C-4204-BBFB-2C91D6ABD93A", "versionEndExcluding": "250", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation cf-release versions prior to 250 and CAPI-release versions prior to 1.12.0. A user with the SpaceAuditor role is over-privileged with the ability to restage applications. This could cause application downtime if the restage fails." }, { "lang": "es", "value": "Se ha descubierto un problema en Cloud Foundry Foundation cf-release en versiones anteriores a 250 y las versiones CAPI-release anteriores a la 1.12.0. Un usuario con el rol SpaceAuditor tiene demasiados privilegios y la capacidad de realizar una copia intermedia de las aplicaciones. Esto podr\u00eda provocar tiempo de inactividad en la aplicaci\u00f3n si la copia intermedia fracasa." } ], "id": "CVE-2016-8219", "lastModified": "2024-11-21T02:59:00.597", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-13T06:29:00.270", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2016-8219/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2016-8219/" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-10-24 17:29
Modified
2024-11-21 02:32
Severity ?
Summary
Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire password reset links.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://pivotal.io/security/cve-2015-5170-5173 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://pivotal.io/security/cve-2015-5170-5173 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | cf-release | * | |
pivotal_software | cloud_foundry_elastic_runtime | * | |
pivotal_software | cloud_foundry_uaa | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E39C984-9592-4C18-A220-F3BF2FF0E4D3", "versionEndExcluding": "216", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "349BBE7C-CB38-4F96-B42C-03982C4D6071", "versionEndExcluding": "1.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FF9860B-08BA-42CA-A3C0-34BE821C47B2", "versionEndExcluding": "2.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire password reset links." }, { "lang": "es", "value": "Cloud Foundry Runtime cf-release en versiones anteriores a la 216, UAA en versiones anteriores a la 2.5.2 y Pivotal Cloud Foundry (PCF) Elastic Runtime en versiones anteriores a la 1.7.0 permite que atacantes causen un impacto no especificado aprovechando que no caducan los enlaces de reinicio de contrase\u00f1a." } ], "id": "CVE-2015-5172", "lastModified": "2024-11-21T02:32:29.773", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-24T17:29:00.260", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2015-5170-5173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2015-5170-5173" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-640" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-05-25 17:29
Modified
2024-11-21 02:28
Severity ?
Summary
With Cloud Foundry Runtime cf-release versions v209 or earlier, UAA Standalone versions 2.2.6 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier the change_email form in UAA is vulnerable to a CSRF attack. This allows an attacker to trigger an e-mail change for a user logged into a cloud foundry instance via a malicious link on a attacker controlled site. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://pivotal.io/security/cve-2015-3191 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://pivotal.io/security/cve-2015-3191 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | cf-release | * | |
pivotal_software | cloud_foundry_elastic_runtime | * | |
pivotal_software | cloud_foundry_uaa | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "D648E4CC-C6C7-4C5C-B554-528D4DBDC079", "versionEndIncluding": "209", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB6812A0-8836-4F25-9AC1-DB552BC605ED", "versionEndIncluding": "1.4.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7981BF0-D4AF-4E06-96DE-725FE2D581A5", "versionEndIncluding": "2.2.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "With Cloud Foundry Runtime cf-release versions v209 or earlier, UAA Standalone versions 2.2.6 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier the change_email form in UAA is vulnerable to a CSRF attack. This allows an attacker to trigger an e-mail change for a user logged into a cloud foundry instance via a malicious link on a attacker controlled site. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected." }, { "lang": "es", "value": "En Cloud Foundry Runtime versiones v209 y anteriores, UAA Standalone versiones 2.2.6 o anteriores y Pivotal Cloud Foundry Runtime, versiones 1.4.5 o anteriores, el formulario change_email en UAA es vulnerable a un ataque de tipo CSFR. Esto permitir\u00eda a un atacante activar un cambio de e-mail para un usuario logado en una instancia de Cloud Foundry a trav\u00e9s de un link malicioso en un site controlado por el atacante. Despliegues habilitados para la integraci\u00f3n a trav\u00e9s de SAML o LDAP no estar\u00edan afectados." } ], "id": "CVE-2015-3191", "lastModified": "2024-11-21T02:28:52.110", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-05-25T17:29:00.410", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2015-3191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2015-3191" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-07 13:29
Modified
2024-11-21 02:42
Severity ?
Summary
The identity zones feature in Pivotal Cloud Foundry 208 through 229; UAA 2.0.0 through 2.7.3 and 3.0.0; UAA-Release 2 through 4, when configured with multiple identity zones; and Elastic Runtime 1.6.0 through 1.6.13 allows remote authenticated users with privileges in one zone to gain privileges and perform operations on a different zone via unspecified vectors.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://pivotal.io/security/cve-2016-0732 | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://pivotal.io/security/cve-2016-0732 | Mitigation, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6351C26-3E4F-4783-AC20-13076FDFD898", "versionEndIncluding": "229", "versionStartIncluding": "208", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8FAB232F-1FA4-4C5E-B302-68065DBA7510", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "44FEA25C-11C6-495C-84B6-EC8EDE0A5250", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D69110C2-044B-4EFE-B947-7E7FF382B110", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "62C001BE-9484-4AC9-9A03-890CD70A5DC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B3E5A61-D13E-427F-AD00-F86ECD567318", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "49D09957-D01C-4914-A05F-B5F242DAD261", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "86766366-895E-4AEB-B5B0-E8181109EF39", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "6C0EDADC-A658-4776-91C0-07DF44792356", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "BDC9EBE9-D869-4CAF-B4AD-F5F36EA040D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "65E7C154-AB1D-4190-8C28-50355A6AC0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4ABB4CA3-B087-480F-BF3F-AE3FAEC4241F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "D0AF5FCE-D03F-4642-A266-F7F4F2577F8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AF0C1DC-E17B-41F2-B537-FD8950371064", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "814FB6AA-4325-4AE6-9F92-01037EBE16EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "BAACFFD2-AD71-4812-883A-7E27ECD79945", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "2745C09B-1A58-47AA-99CF-7860CB3F9FED", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5AD6D54E-2336-4F94-B336-390123A3D2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "75994E15-A991-4336-85FC-10CBAE5C69E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "73193F21-2BD0-4481-9EBF-458984F1FC23", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9CBD2130-EB88-4988-8995-CAC28710F3D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "04FCBE2B-A0DD-475C-94C6-01B365FA8705", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AAA1F712-56A8-4EEF-9220-7F047423611A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "78D7CE72-75BD-477B-A75D-8E0F8DB7678D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6EC83A4-6CD0-4575-B504-0E4839DFF2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "BCBA7C49-82DC-42E6-BA32-624DCC91EE08", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F976310D-C749-4664-8AA4-548D23C39BCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "52F58109-88F6-476D-B08A-801EC0A69BDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "484046E8-4048-4397-B391-AFB7EF38993C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "905F3804-FAE0-4940-83D3-591A55A0B325", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "EC27E1DD-648A-4FFC-8F4C-B3826329AC9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "E5F50475-6C2B-4DEF-90B1-AEFACF6954F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "7CEB468C-0748-4838-AD9E-ECF9B920B19A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "09DC2E28-7D43-4323-A522-7FFEACB5E88A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:uaa-release:2:*:*:*:*:*:*:*", "matchCriteriaId": "8703E628-1ECE-4CA2-8003-DC902E920EE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:uaa-release:3:*:*:*:*:*:*:*", "matchCriteriaId": "770AFCA5-A1FA-4CB6-98BF-A226D4DF429A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:uaa-release:4:*:*:*:*:*:*:*", "matchCriteriaId": "3F6047B3-346D-4809-B713-9513935D5783", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pivotal:elastic_runtime:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1D5416C8-AB64-4BC5-B1FE-5C08F7D5AF82", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:elastic_runtime:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "459E7CBD-AF09-43F8-B224-6BF8BB4D396E", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:elastic_runtime:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "7E4BB9CD-3D23-4CC1-AEFA-19CADB24EFBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:elastic_runtime:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "AD1D43E8-A4E8-4D5E-B482-B301BAC99846", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:elastic_runtime:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "F5A0057F-FE6D-450B-83BF-00BB9D9DFCDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:elastic_runtime:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3A1763BC-6CD0-4AAE-BAA0-BE5F21EC7EDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:elastic_runtime:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "3E18E06E-FF5F-431D-A613-99FE7130BCD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:elastic_runtime:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "B04F41B2-E70D-4D5E-AB1E-2595A16AF3BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:elastic_runtime:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "38F08EF3-A4A2-423E-A4B8-486220716DB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:elastic_runtime:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "08D63E00-1DE1-4F76-A7E4-43BA0D643682", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:elastic_runtime:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6BEA097B-09DC-40A8-9353-A3BF45AF3A48", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:elastic_runtime:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "3D149DEB-8FDB-42B3-A748-0A966D82DCA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:elastic_runtime:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "77ECF4F7-BF73-46D8-AC12-300135C1FC38", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:elastic_runtime:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "E827400C-F2C5-455E-8347-CD3628CACBCA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The identity zones feature in Pivotal Cloud Foundry 208 through 229; UAA 2.0.0 through 2.7.3 and 3.0.0; UAA-Release 2 through 4, when configured with multiple identity zones; and Elastic Runtime 1.6.0 through 1.6.13 allows remote authenticated users with privileges in one zone to gain privileges and perform operations on a different zone via unspecified vectors." }, { "lang": "es", "value": "La caracter\u00edstica de zonas de identidad en Pivotal Cloud Foundry 208 a 229; UAA 2.0.0 a 2.7.3 y 3.0.0; UAA-Release 2 hasta la 4, cuando se configura con m\u00faltiples zonas de identidad; y Elastic Runtime 1.6.0 hasta la 1.6.13 permite que los usuarios remotos autenticados con privilegios en una zona obtengan privilegios y realicen operaciones en una zona diferente mediante vectores no especificados." } ], "id": "CVE-2016-0732", "lastModified": "2024-11-21T02:42:16.330", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-07T13:29:00.293", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2016-0732" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2016-0732" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-06-13 06:29
Modified
2024-11-21 03:26
Severity ?
Summary
An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v258; UAA release 2.x versions prior to v2.7.4.15, 3.6.x versions prior to v3.6.9, 3.9.x versions prior to v3.9.11, and other versions prior to v3.16.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.13, 24.x versions prior to v24.8, and other versions prior to v30.1. An authorized user can use a blind SQL injection attack to query the contents of the UAA database, aka "Blind SQL Injection with privileged UAA endpoints."
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | http://www.securityfocus.com/bid/99254 | Broken Link, Third Party Advisory, VDB Entry | |
security_alert@emc.com | https://www.cloudfoundry.org/cve-2017-4974/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/99254 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cloudfoundry.org/cve-2017-4974/ | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB81DE95-661D-46E7-900D-10B18EC18EE0", "versionEndIncluding": "v257", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8396327-A941-4AA1-A548-4DA197D25F82", "versionEndIncluding": "30", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "C24E2CE5-6DBA-4B45-951D-0F7189C9A94D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "F0EB01AB-A033-4DCC-B433-0674078E31DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.3:*:*:*:*:*:*:*", "matchCriteriaId": "749B1CBF-6297-4F4D-970D-25D1D0A88AE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.4:*:*:*:*:*:*:*", "matchCriteriaId": "6C369E22-27DF-40B3-B94F-45DFC47E6A60", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.5:*:*:*:*:*:*:*", "matchCriteriaId": "15A2FE05-FC02-4FC1-B9B3-40E4EC62C5D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.6:*:*:*:*:*:*:*", "matchCriteriaId": "6A4975D0-2C4D-4883-A849-D434FB8A7E2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.7:*:*:*:*:*:*:*", "matchCriteriaId": "6E85B347-27E2-4EF9-9CF0-13902EC4741D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.8:*:*:*:*:*:*:*", "matchCriteriaId": "93081AC1-C07E-4E6D-8B1E-8D561461FEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.9:*:*:*:*:*:*:*", "matchCriteriaId": "E4F6208B-7FA5-4177-8942-2037BEE99546", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.10:*:*:*:*:*:*:*", "matchCriteriaId": "FD8DA4C6-BCA9-4959-82FC-2596C6EBD6E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.11:*:*:*:*:*:*:*", "matchCriteriaId": "8120A442-6A3D-4918-A829-A84B2B9694E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.12:*:*:*:*:*:*:*", "matchCriteriaId": "9D7AF658-FFBB-49AB-8A44-9989A7FEC707", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24:*:*:*:*:*:*:*", "matchCriteriaId": "A090F790-1A28-4238-8727-3F9475706A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.1:*:*:*:*:*:*:*", "matchCriteriaId": "AEFE0727-C152-4726-A70E-C75BACD31071", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.2:*:*:*:*:*:*:*", "matchCriteriaId": "38D708B8-485D-445E-8A21-474A500F1184", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.3:*:*:*:*:*:*:*", "matchCriteriaId": "E4B8A221-8740-4D35-871D-EABDB2F8332D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.4:*:*:*:*:*:*:*", "matchCriteriaId": "A426C1DD-0C64-468A-B96E-B0B94FFF0A89", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.5:*:*:*:*:*:*:*", "matchCriteriaId": "DEFEEACE-5BED-4507-A770-69D36F478791", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.6:*:*:*:*:*:*:*", "matchCriteriaId": "860B073C-AC50-473C-9650-7421F3638FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.7:*:*:*:*:*:*:*", "matchCriteriaId": "1B44C3F2-5AC4-4D05-BAF0-EFDFB3FDC3BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:30.1:*:*:*:*:*:*:*", "matchCriteriaId": "E80E3184-345D-4C78-ABAA-94B3D9A53252", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:30.2:*:*:*:*:*:*:*", "matchCriteriaId": "5F654A04-B949-415D-982A-7341486B2B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:30.3:*:*:*:*:*:*:*", "matchCriteriaId": "CEF9F58F-1387-4D84-932F-8CC8F380E797", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF552C5A-2298-43F4-AF70-20E9E4B402D4", "versionEndIncluding": "4.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "942E59F5-172F-4802-81AE-D43E72189889", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDEF8D-9BE5-43ED-8E1D-2B63A1294EDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "504AA7E0-D1F5-4097-B53B-F0E36328B1EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "0DCD6CB7-5D49-4897-8353-44E5B08D9375", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "B1B4C4EB-3337-4053-BA4B-93A849263A42", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9339A684-B1F0-4110-9E48-A04BED74DC2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "F35CCB74-63A3-4F95-9EAE-ADC5A8BACB99", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "A2A1BAE9-FCB6-458E-A1A6-03F0AB742E5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "2261C887-8179-4BBA-A2CF-174F8F3017FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "6EED2616-E58D-4604-BBBC-AC24BCA068A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "916733EA-F51A-49E2-9D47-9B713B36C847", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA1887F9-EB71-41AE-9E45-DD86A54AA958", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "E7D01A32-98DA-4F7F-B7A0-D1695478C208", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "4C57AACB-1ECA-4047-A8AA-D768DA54BB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "6D164FF1-D85D-4800-A726-465A32974BEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "6CAC5B15-895E-43CA-AFE1-EE7E06EF08D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "10286C78-A413-4FD3-B7F7-39C17A50D75C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "8D022F9B-4877-4A97-AE22-BAF579B38DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "D741750F-DC85-4701-90F7-4AE00DB04B0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "E126E318-6572-4BC3-8FA4-835AC49432C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "3A5B622B-C14C-4160-ACFD-CD2AB3786828", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "EBE0A85A-5B1A-49E0-8FC7-4A68505B6506", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "A8E3CEAB-E58E-4870-A719-F46D6DE2E710", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "3DEDD149-4BBB-47A1-8E23-2247DCF9C13C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "225B90A0-757D-4406-9EC1-A31968CC7F87", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "FC8157B8-A26B-4148-A02A-DBEC662FE701", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6955DB34-FA12-41A6-A90F-456777ADEB81", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B92D875-509C-42BE-90E4-112C94170199", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "166C908D-7D5F-43DD-B3EA-BAFF23DBBDAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "6B83917A-D326-4874-AD82-0DBD131DC0EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "C5C19F44-AB0F-44BB-A298-F81B853FA71D", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "B981590F-0649-4BBA-AB5F-CC5C7858DFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "1A36B9F9-6D45-4D84-869A-25131BF482BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "FADC5C69-1910-4D19-97B2-B44A594B8B34", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "B5314895-961D-4D2B-A0C9-1B23C03317CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "DA5A5B1C-7111-464E-9F49-D13621233AC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.12:*:*:*:*:*:*:*", "matchCriteriaId": "C97CB502-CE1E-4B63-88D0-7A826C825B84", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "4F3AAD33-275B-4FF1-9434-BEE85543F7B3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v258; UAA release 2.x versions prior to v2.7.4.15, 3.6.x versions prior to v3.6.9, 3.9.x versions prior to v3.9.11, and other versions prior to v3.16.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.13, 24.x versions prior to v24.8, and other versions prior to v30.1. An authorized user can use a blind SQL injection attack to query the contents of the UAA database, aka \"Blind SQL Injection with privileged UAA endpoints.\"" }, { "lang": "es", "value": "Se detect\u00f3 un problema en cf-release versiones anteriores a v258; UAA release versiones 2.x anteriores a v2.7.4.15, versiones 3.6.x anteriores a v3.6.9, versiones 3.9.x anteriores a v3.9.11, y otras versiones anteriores a v3.16.0; y UAA bosh release (uaa-release) versiones 13.x anteriores a v13.13, versiones 24.x anteriores a v24.8, y otras versiones anteriores a v30.1 de Cloud Foundry Foundation. Un usuario autorizado puede usar un ataque de inyecci\u00f3n SQL a ciegas para consultar el contenido de la base de datos UAA, tambi\u00e9n se conoce como \"Blind SQL Injection with privileged UAA endpoints.\"" } ], "id": "CVE-2017-4974", "lastModified": "2024-11-21T03:26:47.160", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-13T06:29:00.677", "references": [ { "source": "security_alert@emc.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99254" }, { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-4974/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-4974/" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-10-24 17:29
Modified
2024-11-21 02:32
Severity ?
Summary
Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow remote attackers to conduct cross-site request forgery (CSRF) attacks on PWS and log a user into an arbitrary account by leveraging lack of CSRF checks.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.securityfocus.com/bid/101579 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://pivotal.io/security/cve-2015-5170-5173 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101579 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://pivotal.io/security/cve-2015-5170-5173 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | cf-release | * | |
pivotal_software | cloud_foundry_elastic_runtime | * | |
pivotal_software | cloud_foundry_uaa | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E39C984-9592-4C18-A220-F3BF2FF0E4D3", "versionEndExcluding": "216", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "349BBE7C-CB38-4F96-B42C-03982C4D6071", "versionEndExcluding": "1.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FF9860B-08BA-42CA-A3C0-34BE821C47B2", "versionEndExcluding": "2.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow remote attackers to conduct cross-site request forgery (CSRF) attacks on PWS and log a user into an arbitrary account by leveraging lack of CSRF checks." }, { "lang": "es", "value": "Cloud Foundry Runtime cf-release en versiones anteriores a la 216, UAA en versiones anteriores a la 2.5.2 y Pivotal Cloud Foundry (PCF) Elastic Runtime en versiones anteriores a la 1.7.0 permite que atacantes remotos realicen ataques Cross-Site Request Forgery (CSRF) en PWS y registren un usuario en una cuenta arbitraria aprovech\u00e1ndose de la falta de chequeos contra CSRF." } ], "id": "CVE-2015-5170", "lastModified": "2024-11-21T02:32:29.570", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-24T17:29:00.183", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101579" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2015-5170-5173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101579" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2015-5170-5173" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-04 06:29
Modified
2024-11-21 03:59
Severity ?
Summary
An issue was discovered in these Pivotal Cloud Foundry products: all versions prior to cf-release v270, UAA v3.x prior to v3.20.2, and UAA bosh v30.x versions prior to v30.8 and all other versions prior to v45.0. A cross-site scripting (XSS) attack is possible in the clientId parameter of a request to the UAA OpenID Connect check session iframe endpoint used for single logout session management.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | http://www.securityfocus.com/bid/102427 | Third Party Advisory, VDB Entry | |
security_alert@emc.com | https://www.cloudfoundry.org/cve-2018-1190/ | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102427 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cloudfoundry.org/cve-2018-1190/ | Issue Tracking, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | cf-release | * | |
pivotal | uaa | * | |
pivotal | uaa_bosh | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "9082B432-BB81-4AF8-A422-B4D3EF2E5B8D", "versionEndIncluding": "269", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:uaa:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C185209-47E9-41E1-8DDA-00144F5A06E0", "versionEndIncluding": "3.20.1", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:uaa_bosh:*:*:*:*:*:*:*:*", "matchCriteriaId": "2582ECE3-3F3F-4CC2-A4DB-799C165E33F1", "versionEndIncluding": "44", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in these Pivotal Cloud Foundry products: all versions prior to cf-release v270, UAA v3.x prior to v3.20.2, and UAA bosh v30.x versions prior to v30.8 and all other versions prior to v45.0. A cross-site scripting (XSS) attack is possible in the clientId parameter of a request to the UAA OpenID Connect check session iframe endpoint used for single logout session management." }, { "lang": "es", "value": "Se ha encontrado un problema en los siguientes productos Pivotal Cloud Foundry: todas las versiones anteriores a cf-release v270, UAA v3.x anteriores a la v3.20.2 y UAA bosh v30.x en versiones anteriores al a v30.8 y todas las dem\u00e1s versiones anteriores a la v45.0. Es posible un ataque Cross-Site Scripting (XSS) en el par\u00e1metro clientId de una petici\u00f3n al endpoint UAA OpenID Connect check session iframe utilizado para gestionar las sesiones Single-Logout." } ], "id": "CVE-2018-1190", "lastModified": "2024-11-21T03:59:21.920", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-04T06:29:00.467", "references": [ { "source": "security_alert@emc.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102427" }, { "source": "security_alert@emc.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2018-1190/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102427" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2018-1190/" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-05-25 17:29
Modified
2024-11-21 02:26
Severity ?
Summary
A path traversal vulnerability was identified in the Cloud Foundry component Cloud Controller that affects cf-release versions prior to v208 and Pivotal Cloud Foundry Elastic Runtime versions prior to 1.4.2. Path traversal is the 'outbreak' of a given directory structure through relative file paths in the user input. It aims at accessing files and directories that are stored outside the web root folder, for disallowed reading or even executing arbitrary system commands. An attacker could use a certain parameter of the file path for instance to inject '../' sequences in order to navigate through the file system. In this particular case a remote authenticated attacker can exploit the identified vulnerability in order to upload arbitrary files to the server running a Cloud Controller instance - outside the isolated application container.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | http://www.securityfocus.com/bid/98691 | Third Party Advisory, VDB Entry | |
security_alert@emc.com | https://pivotal.io/security/cve-2015-1834 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/98691 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://pivotal.io/security/cve-2015-1834 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | cf-release | * | |
pivotal_software | cloud_foundry_elastic_runtime | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C42A408-570D-42C3-B5AF-C173D14B7CE6", "versionEndIncluding": "207", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "567FE032-B2D3-47EC-9CCB-2298311C1924", "versionEndIncluding": "1.4.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability was identified in the Cloud Foundry component Cloud Controller that affects cf-release versions prior to v208 and Pivotal Cloud Foundry Elastic Runtime versions prior to 1.4.2. Path traversal is the \u0027outbreak\u0027 of a given directory structure through relative file paths in the user input. It aims at accessing files and directories that are stored outside the web root folder, for disallowed reading or even executing arbitrary system commands. An attacker could use a certain parameter of the file path for instance to inject \u0027../\u0027 sequences in order to navigate through the file system. In this particular case a remote authenticated attacker can exploit the identified vulnerability in order to upload arbitrary files to the server running a Cloud Controller instance - outside the isolated application container." }, { "lang": "es", "value": "Una vulnerabilidad de salto de directorio ha sido identificada en el componente Cloud Controller de Cloud Foundry, versiones anteriores a la v208 y en Pivotal Cloud Foundry Elastic Runtime, versiones anteriores a la 1.4.2. Un salto de directorio puede originarse a trav\u00e9s de una estructura de directorios relativa a la ruta de un fichero apuntada en una entrada de usuario. El objetivo es el acceso a ficheros y directorios situados fuera de la carpeta web ra\u00edz, con la finalidad de realizar lecturas no autorizadas o incluso ejecutar comandos de sistema arbitrarios. Un atacante podr\u00eda utilizar un cierto par\u00e1metro de la ruta del fichero para p.e. inyectar secuencias de \u0027../\u0027 para navegar a trav\u00e9s del sistema de ficheros. En este caso particular, un atacante remoto autenticado pudr\u00eda explotar esta vulnerabilidad para cargar ficheros arbitrarios en el servidor donde se est\u00e1 ejecutando una instancia de Cloud Controller fuera del contenedor que a\u00edsla a la aplicaci\u00f3n." } ], "id": "CVE-2015-1834", "lastModified": "2024-11-21T02:26:14.327", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-05-25T17:29:00.287", "references": [ { "source": "security_alert@emc.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98691" }, { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2015-1834" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98691" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2015-1834" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-01-13 09:59
Modified
2024-11-21 03:01
Severity ?
Summary
An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v250 and CAPI-release versions prior to v1.12.0. Cloud Foundry logs the credentials returned from service brokers in Cloud Controller system component logs. These logs are written to disk and often sent to a log aggregator via syslog.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | http://www.securityfocus.com/bid/95441 | Third Party Advisory, VDB Entry | |
security_alert@emc.com | https://www.cloudfoundry.org/cve-2016-9882/ | Mitigation, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/95441 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cloudfoundry.org/cve-2016-9882/ | Mitigation, Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | capi-release | * | |
cloudfoundry | cf-release | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E50F8DC-578F-4781-A144-A871514F064E", "versionEndIncluding": "1.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "A812C34E-6F43-41EF-96DA-62DF4A5FB653", "versionEndIncluding": "249", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v250 and CAPI-release versions prior to v1.12.0. Cloud Foundry logs the credentials returned from service brokers in Cloud Controller system component logs. These logs are written to disk and often sent to a log aggregator via syslog." }, { "lang": "es", "value": "Se descubri\u00f3 un problema Cloud Foundry Foundation cf-release en versiones anteriores a v250 y CAPI-release en versiones anteriores a v1.12.0. Cloud Foundry registra las credenciales devueltas por los intermediarios de servicio en los registros de componentes del sistema Cloud Controller. Estos registros se escriben en disco y, a menudo, se env\u00edan a un agregador de registros a trav\u00e9s de syslog." } ], "id": "CVE-2016-9882", "lastModified": "2024-11-21T03:01:56.747", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-01-13T09:59:00.467", "references": [ { "source": "security_alert@emc.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/95441" }, { "source": "security_alert@emc.com", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2016-9882/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/95441" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2016-9882/" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-07-17 14:29
Modified
2024-11-21 03:33
Severity ?
Summary
The Cloud Controller and Router in Cloud Foundry (CAPI-release capi versions prior to v1.32.0, Routing-release versions prior to v0.159.0, CF-release versions prior to v267) do not validate the issuer on JSON Web Tokens (JWTs) from UAA. With certain multi-zone UAA configurations, zone administrators are able to escalate their privileges.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://www.cloudfoundry.org/cve-2017-8034/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cloudfoundry.org/cve-2017-8034/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | capi-release | * | |
cloudfoundry | cf-release | * | |
cloudfoundry | routing-release | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "74ADCD1C-5F30-45D1-9CA5-343462A54FE0", "versionEndIncluding": "1.31.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DA8FC23-944E-4157-A830-ABF07AE0D575", "versionEndIncluding": "266", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:routing-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1E2500E-D912-4E0D-A1EB-9BDB7CFBB869", "versionEndIncluding": "0.158.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Cloud Controller and Router in Cloud Foundry (CAPI-release capi versions prior to v1.32.0, Routing-release versions prior to v0.159.0, CF-release versions prior to v267) do not validate the issuer on JSON Web Tokens (JWTs) from UAA. With certain multi-zone UAA configurations, zone administrators are able to escalate their privileges." }, { "lang": "es", "value": "El controlador y el enrutador de nube en Cloud Foundry (publicaci\u00f3n de CAPI versiones de capi anteriores a v1.32.0, publicaci\u00f3n de enrutamiento versi\u00f3n anterior a v0.159.0, publicaci\u00f3n de CF versi\u00f3n anterior a v267), no comprueban el emisor en los Tokens Web JSON (JWTs) de la UAA. Con determinadas configuraciones UAA multizona, los administradores de zona pueden escalar sus privilegios." } ], "id": "CVE-2017-8034", "lastModified": "2024-11-21T03:33:11.503", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 0.7, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-07-17T14:29:01.280", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-8034/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-8034/" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-565" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-07-25 04:29
Modified
2024-11-21 03:33
Severity ?
Summary
An issue was discovered in the Cloud Controller API in Cloud Foundry Foundation CAPI-release versions after v1.6.0 and prior to v1.35.0 and cf-release versions after v244 and prior to v268. A carefully crafted CAPI request from a Space Developer can allow them to gain access to files on the Cloud Controller VM for that installation.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://www.cloudfoundry.org/cve-2017-8035/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cloudfoundry.org/cve-2017-8035/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | capi-release | * | |
cloudfoundry | cf-release | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A0C915A-9E70-4210-A449-7C0B8E092AE1", "versionEndExcluding": "1.35.0", "versionStartIncluding": "1.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "A287CDAB-5206-4F42-8CAE-4371C82965B7", "versionEndExcluding": "268", "versionStartIncluding": "245", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Cloud Controller API in Cloud Foundry Foundation CAPI-release versions after v1.6.0 and prior to v1.35.0 and cf-release versions after v244 and prior to v268. A carefully crafted CAPI request from a Space Developer can allow them to gain access to files on the Cloud Controller VM for that installation." }, { "lang": "es", "value": "Se ha descubierto en la API Cloud Controller en Cloud Foundry Foundation CAPI-release en versiones posteriores a 1.6.0 y anteriores a 1.35.0 y las versiones cf-release posteriores a v244 y anteriores a v268. Una petici\u00f3n CAPI especialmente manipulada desde un Space Developer puede permitir que atacantes obtengan acceso al Cloud Controller VM para tal instalaci\u00f3n." } ], "id": "CVE-2017-8035", "lastModified": "2024-11-21T03:33:11.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-07-25T04:29:00.257", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-8035/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-8035/" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-07-25 04:29
Modified
2024-11-21 03:33
Severity ?
Summary
An issue was discovered in the Cloud Controller API in Cloud Foundry Foundation CAPI-release versions prior to v1.35.0 and cf-release versions prior to v268. A filesystem traversal vulnerability exists in the Cloud Controller that allows a space developer to escalate privileges by pushing a specially crafted application that can write arbitrary files to the Cloud Controller VM.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://www.cloudfoundry.org/cve-2017-8033/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cloudfoundry.org/cve-2017-8033/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | capi-release | * | |
cloudfoundry | cf-release | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF4B940B-21FF-4FF9-92C0-12FBB8DC5C4B", "versionEndExcluding": "1.35.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "64E1973B-8A36-443B-AC11-1BC29076C4B4", "versionEndExcluding": "268", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Cloud Controller API in Cloud Foundry Foundation CAPI-release versions prior to v1.35.0 and cf-release versions prior to v268. A filesystem traversal vulnerability exists in the Cloud Controller that allows a space developer to escalate privileges by pushing a specially crafted application that can write arbitrary files to the Cloud Controller VM." }, { "lang": "es", "value": "Se ha descubierto en la API Cloud Controller en Cloud Foundry Foundation CAPI-release en versiones anteriores a 1.35.0 y las versiones cf-release anteriores a v268. Existe una vulnerabilidad de salto de sistema de archivos en Cloud Controller que permite que un desarrollador de espacio escale privilegios ejecutando una aplicaci\u00f3n especialmente manipulada que pueda escribir archivos arbitrarios en Cloud Controller VM." } ], "id": "CVE-2017-8033", "lastModified": "2024-11-21T03:33:11.393", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-07-25T04:29:00.227", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-8033/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-8033/" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-06-13 06:29
Modified
2024-11-21 03:26
Severity ?
Summary
An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v260; UAA release 2.x versions prior to v2.7.4.16, 3.6.x versions prior to v3.6.10, 3.9.x versions prior to v3.9.12, and other versions prior to v3.17.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.14, 24.x versions prior to v24.9, 30.x versions prior to 30.2, and other versions prior to v36. Privileged users in one zone are allowed to perform a password reset for users in a different zone.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://www.cloudfoundry.org/cve-2017-4991/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cloudfoundry.org/cve-2017-4991/ | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "E08A7651-1329-42BB-BBAA-3C7D61D57E06", "versionEndIncluding": "259", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:*:*:*:*:*:*:*:*", "matchCriteriaId": "5319D527-5D76-4ADB-8153-36862A85F885", "versionEndIncluding": "35", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "C24E2CE5-6DBA-4B45-951D-0F7189C9A94D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "F0EB01AB-A033-4DCC-B433-0674078E31DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.3:*:*:*:*:*:*:*", "matchCriteriaId": "749B1CBF-6297-4F4D-970D-25D1D0A88AE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.4:*:*:*:*:*:*:*", "matchCriteriaId": "6C369E22-27DF-40B3-B94F-45DFC47E6A60", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.5:*:*:*:*:*:*:*", "matchCriteriaId": "15A2FE05-FC02-4FC1-B9B3-40E4EC62C5D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.6:*:*:*:*:*:*:*", "matchCriteriaId": "6A4975D0-2C4D-4883-A849-D434FB8A7E2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.7:*:*:*:*:*:*:*", "matchCriteriaId": "6E85B347-27E2-4EF9-9CF0-13902EC4741D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.8:*:*:*:*:*:*:*", "matchCriteriaId": "93081AC1-C07E-4E6D-8B1E-8D561461FEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.9:*:*:*:*:*:*:*", "matchCriteriaId": "E4F6208B-7FA5-4177-8942-2037BEE99546", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.10:*:*:*:*:*:*:*", "matchCriteriaId": "FD8DA4C6-BCA9-4959-82FC-2596C6EBD6E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.11:*:*:*:*:*:*:*", "matchCriteriaId": "8120A442-6A3D-4918-A829-A84B2B9694E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.12:*:*:*:*:*:*:*", "matchCriteriaId": "9D7AF658-FFBB-49AB-8A44-9989A7FEC707", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:13.13:*:*:*:*:*:*:*", "matchCriteriaId": "BC42F184-AFEC-4992-BFEF-B410CDF1452A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24:*:*:*:*:*:*:*", "matchCriteriaId": "A090F790-1A28-4238-8727-3F9475706A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.1:*:*:*:*:*:*:*", "matchCriteriaId": "AEFE0727-C152-4726-A70E-C75BACD31071", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.2:*:*:*:*:*:*:*", "matchCriteriaId": "38D708B8-485D-445E-8A21-474A500F1184", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.3:*:*:*:*:*:*:*", "matchCriteriaId": "E4B8A221-8740-4D35-871D-EABDB2F8332D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.4:*:*:*:*:*:*:*", "matchCriteriaId": "A426C1DD-0C64-468A-B96E-B0B94FFF0A89", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.5:*:*:*:*:*:*:*", "matchCriteriaId": "DEFEEACE-5BED-4507-A770-69D36F478791", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.6:*:*:*:*:*:*:*", "matchCriteriaId": "860B073C-AC50-473C-9650-7421F3638FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.7:*:*:*:*:*:*:*", "matchCriteriaId": "1B44C3F2-5AC4-4D05-BAF0-EFDFB3FDC3BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.8:*:*:*:*:*:*:*", "matchCriteriaId": "C2BBC265-7026-469B-BB30-D7DB7A334A65", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.9:*:*:*:*:*:*:*", "matchCriteriaId": "08E99F4C-6BB5-415E-A5F3-285A3219EEF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:24.10:*:*:*:*:*:*:*", "matchCriteriaId": "03E24F1B-C999-4C02-BFDD-00F1E2A53E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:30:*:*:*:*:*:*:*", "matchCriteriaId": "75D365CB-5BDA-4387-AA3E-2F02B552162F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:30.1:*:*:*:*:*:*:*", "matchCriteriaId": "E80E3184-345D-4C78-ABAA-94B3D9A53252", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF552C5A-2298-43F4-AF70-20E9E4B402D4", "versionEndIncluding": "4.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "942E59F5-172F-4802-81AE-D43E72189889", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDEF8D-9BE5-43ED-8E1D-2B63A1294EDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "504AA7E0-D1F5-4097-B53B-F0E36328B1EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "0DCD6CB7-5D49-4897-8353-44E5B08D9375", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "B1B4C4EB-3337-4053-BA4B-93A849263A42", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9339A684-B1F0-4110-9E48-A04BED74DC2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "F35CCB74-63A3-4F95-9EAE-ADC5A8BACB99", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "A2A1BAE9-FCB6-458E-A1A6-03F0AB742E5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "2261C887-8179-4BBA-A2CF-174F8F3017FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "6EED2616-E58D-4604-BBBC-AC24BCA068A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "916733EA-F51A-49E2-9D47-9B713B36C847", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA1887F9-EB71-41AE-9E45-DD86A54AA958", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "E7D01A32-98DA-4F7F-B7A0-D1695478C208", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "4C57AACB-1ECA-4047-A8AA-D768DA54BB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "6D164FF1-D85D-4800-A726-465A32974BEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "6CAC5B15-895E-43CA-AFE1-EE7E06EF08D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "10286C78-A413-4FD3-B7F7-39C17A50D75C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "8D022F9B-4877-4A97-AE22-BAF579B38DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "87D2BF0D-963C-430F-A4FE-F452F15035BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "D741750F-DC85-4701-90F7-4AE00DB04B0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "E126E318-6572-4BC3-8FA4-835AC49432C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "3A5B622B-C14C-4160-ACFD-CD2AB3786828", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "EBE0A85A-5B1A-49E0-8FC7-4A68505B6506", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "A8E3CEAB-E58E-4870-A719-F46D6DE2E710", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "3DEDD149-4BBB-47A1-8E23-2247DCF9C13C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "225B90A0-757D-4406-9EC1-A31968CC7F87", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "FC8157B8-A26B-4148-A02A-DBEC662FE701", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "3F74AEAE-D823-4B1A-9979-0739F6BA17CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6955DB34-FA12-41A6-A90F-456777ADEB81", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B92D875-509C-42BE-90E4-112C94170199", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "166C908D-7D5F-43DD-B3EA-BAFF23DBBDAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "6B83917A-D326-4874-AD82-0DBD131DC0EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "C5C19F44-AB0F-44BB-A298-F81B853FA71D", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "B981590F-0649-4BBA-AB5F-CC5C7858DFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "1A36B9F9-6D45-4D84-869A-25131BF482BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "FADC5C69-1910-4D19-97B2-B44A594B8B34", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "B5314895-961D-4D2B-A0C9-1B23C03317CF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v260; UAA release 2.x versions prior to v2.7.4.16, 3.6.x versions prior to v3.6.10, 3.9.x versions prior to v3.9.12, and other versions prior to v3.17.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.14, 24.x versions prior to v24.9, 30.x versions prior to 30.2, and other versions prior to v36. Privileged users in one zone are allowed to perform a password reset for users in a different zone." }, { "lang": "es", "value": "Se detect\u00f3 un problema en cf-release versiones anteriores a 260; UAA release versiones 2.x anteriores a 2.7.4.16, versiones 3.6.x anteriores a 3.6.10, versiones 3.9.x anteriores a 3.9.12, y otras versiones anteriores a 3.17.0; y UAA bosh release (uaa-release) versiones 13.x anteriores a 13.14, versiones 24.x anteriores a 24.9, versiones 30.x anterior a 30.2, y otras versiones anteriores a 36 de Cloud Foundry Foundation. Los usuarios con privilegios de una zona pueden realizar un restablecimiento de contrase\u00f1a por los usuarios de una zona diferente." } ], "id": "CVE-2017-4991", "lastModified": "2024-11-21T03:26:49.203", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-13T06:29:00.737", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-4991/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-4991/" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-27 10:29
Modified
2024-11-21 03:33
Severity ?
Summary
An issue was discovered in Cloud Foundry Foundation cf-release (all versions prior to v279) and UAA (30.x versions prior to 30.6, 45.x versions prior to 45.4, 52.x versions prior to 52.1). In some cases, the UAA allows an authenticated user for a particular client to revoke client tokens for other users on the same client. This occurs only if the client is using opaque tokens or JWT tokens validated using the check_token endpoint. A malicious actor could cause denial of service.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | http://www.securityfocus.com/bid/101967 | Third Party Advisory, VDB Entry | |
security_alert@emc.com | https://www.cloudfoundry.org/cve-2017-8031/ | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101967 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cloudfoundry.org/cve-2017-8031/ | Issue Tracking, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | cf-release | * | |
cloudfoundry | uaa-release | * | |
cloudfoundry | uaa-release | * | |
cloudfoundry | uaa-release | 52 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AE35B61-A146-432F-80F9-BCB030184FB0", "versionEndIncluding": "278", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:uaa-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "722E4FAD-80A1-4705-86FF-A10933424862", "versionEndExcluding": "30.6", "versionStartIncluding": "30", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:uaa-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8052FE7-3370-4227-8970-36BABECDADD8", "versionEndExcluding": "45.4", "versionStartIncluding": "45", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:uaa-release:52:*:*:*:*:*:*:*", "matchCriteriaId": "591ACEBD-5EA8-4856-B42E-268CD0C0E8B0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation cf-release (all versions prior to v279) and UAA (30.x versions prior to 30.6, 45.x versions prior to 45.4, 52.x versions prior to 52.1). In some cases, the UAA allows an authenticated user for a particular client to revoke client tokens for other users on the same client. This occurs only if the client is using opaque tokens or JWT tokens validated using the check_token endpoint. A malicious actor could cause denial of service." }, { "lang": "es", "value": "Se ha descubierto un problema en Cloud Foundry Foundation cf-release (todas las versiones anteriores a v279) y UAA (versiones 30.x anteriores a la 30.6; versiones 45.x anteriores a la 45.4 y versiones 52.x anteriores a la 52.1). En algunos casos, UAA permite que un usuario autenticado para un cliente particular revoque tokens de cliente para otros usuarios en el mismo cliente. Esto solo ocurre si el cliente est\u00e1 usando tokens opacos o tokens JWT validados empleando el extremo check_token. Un actor malicioso podr\u00eda provocar una denegaci\u00f3n de servicio (DoS)." } ], "id": "CVE-2017-8031", "lastModified": "2024-11-21T03:33:11.150", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-27T10:29:00.767", "references": [ { "source": "security_alert@emc.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101967" }, { "source": "security_alert@emc.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-8031/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101967" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-8031/" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-08-21 22:29
Modified
2024-11-21 03:33
Severity ?
Summary
In Cloud Foundry Foundation CAPI-release versions after v1.6.0 and prior to v1.38.0 and cf-release versions after v244 and prior to v270, there is an incomplete fix for CVE-2017-8035. If you took steps to remediate CVE-2017-8035 you should also upgrade to fix this CVE. A carefully crafted CAPI request from a Space Developer can allow them to gain access to files on the Cloud Controller VM for that installation, aka an Information Leak / Disclosure.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "F260594E-4032-406D-8B84-3E91400F86FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2D9350E-0AA5-4D9A-A41A-855B40E440D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "A66A9C0A-9B42-4B7E-A4B7-F06601B67FB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "207F6A29-0A37-4CDD-8DB2-E6CD89204013", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3803207-D7A0-47E0-A357-314C245C5C13", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "039156DB-D2DC-4AD5-9ACE-52095FE688BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "7343B84E-3255-4BB4-A988-03BC9DC8D7E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "3EB53101-EC12-49DE-8C3C-3B373C4FA1E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "15625A3E-61A4-4F7E-BFEC-7ED830AE41C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "38B7D6B1-2CB1-4FB1-BC63-3104391D2742", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9D5D4-14E4-404A-B88E-78C8A37CB9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C56907A-3233-435F-933B-8E3ED4965BC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "A33E86E4-BD1C-4D03-9AF4-7A86B0B5BCE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "C409657C-0C4D-4873-B707-38AC618035CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "41CD5C38-E188-41DB-A811-27438525FDAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E3EC8F2-3520-4952-9541-3C56F6D131BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1671324-93EB-4409-9BA5-0D2D847C6A85", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "45AC669D-3AED-48C2-ADA2-D1EE235FA793", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "8970738B-E240-4C3E-A8F6-57FB66976B6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "00406C75-1032-49A3-9C4E-AC41F46CA778", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "D464CFBC-5AEF-4B65-8616-8E31E8C856D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "7FE0978C-1BEC-4FCE-A625-0FF196B3E6C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B258E3E-2291-4180-9735-71EE2874250B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "D416F421-66EB-4A80-BC1A-B99AE3F7E126", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D8DA9C5-C65C-467B-AD90-8B84E8EF9397", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D7F5A30-36EF-4F1D-B712-4F482F757CEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "D8D55D28-676E-42C4-90A5-C9CE306D42C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "76369246-BE4B-4FAC-855B-8590C5C8DFBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "F684CB9F-8079-452A-9F27-8F964C636AD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "772569FD-E641-42EB-A694-64EC4E7437E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:1.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "35A5003C-2FB9-4FA3-AC7E-038CD573A23C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:245:*:*:*:*:*:*:*", "matchCriteriaId": "2DA6A56C-E0FE-4CB1-BE86-4C1E80D97265", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:246:*:*:*:*:*:*:*", "matchCriteriaId": "BAF4D7D1-4C35-4F76-816D-3F2407804E85", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:247:*:*:*:*:*:*:*", "matchCriteriaId": "D852D5F4-DDB4-4C76-88B6-EB49E21FEDC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:248:*:*:*:*:*:*:*", "matchCriteriaId": "B35C30C1-E2B9-4590-8765-1E0DA735E026", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:249:*:*:*:*:*:*:*", "matchCriteriaId": "3680FAA7-9B57-4A9A-BD20-68821A7D4FE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:250:*:*:*:*:*:*:*", "matchCriteriaId": "E9F9A19A-9E31-4E4A-869C-9C13163A06C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:251:*:*:*:*:*:*:*", "matchCriteriaId": "F08095E9-1BA9-438F-B776-D75F419E682E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:252:*:*:*:*:*:*:*", "matchCriteriaId": "CAE29D36-9A2E-4D87-8C0C-D8FC1034B027", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:253:*:*:*:*:*:*:*", "matchCriteriaId": "7E227D42-19CA-45DD-AAC1-8D31537B5BFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:254:*:*:*:*:*:*:*", "matchCriteriaId": "BC145421-17F6-438B-9C3F-8DED72F3B5B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:255:*:*:*:*:*:*:*", "matchCriteriaId": "5046C2CB-99C6-4243-B830-B3957910F1AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:256:*:*:*:*:*:*:*", "matchCriteriaId": "5A07B320-7DC3-4E7B-8997-6606F8FCBEBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:257:*:*:*:*:*:*:*", "matchCriteriaId": "3F7777A5-9136-49E4-9A6F-3C9A6687DAA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:258:*:*:*:*:*:*:*", "matchCriteriaId": "88C90B83-9597-427C-A941-06F0C5A8C3DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:259:*:*:*:*:*:*:*", "matchCriteriaId": "A3D92B65-E45A-42EE-B0B9-AD69E1881E2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:260:*:*:*:*:*:*:*", "matchCriteriaId": "A98BAE4B-184F-49A4-89E1-4F270CC7FEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:261:*:*:*:*:*:*:*", "matchCriteriaId": "A7E78B11-B3E9-4D62-8F17-F2575D7F9181", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:262:*:*:*:*:*:*:*", "matchCriteriaId": "EB5EF186-0D05-497D-A66C-142ED0DFA973", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:263:*:*:*:*:*:*:*", "matchCriteriaId": "7A262620-E71A-44C7-A1F4-BEEDF107BC2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:264:*:*:*:*:*:*:*", "matchCriteriaId": "B9D721F9-227C-4F1D-9010-D1920F692228", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:265:*:*:*:*:*:*:*", "matchCriteriaId": "6AE4BA55-963C-4EB1-AD85-344AAE107A82", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:266:*:*:*:*:*:*:*", "matchCriteriaId": "7E5827B3-143F-408B-A0C7-005079BD9215", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:267:*:*:*:*:*:*:*", "matchCriteriaId": "762BE4A1-931B-4C44-94C8-F5DC894CFD1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:268:*:*:*:*:*:*:*", "matchCriteriaId": "735E1016-97F0-4286-955F-6017A2F8AD79", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:269:*:*:*:*:*:*:*", "matchCriteriaId": "F021AB15-30F0-46DE-B613-11E3D4C9FD50", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Cloud Foundry Foundation CAPI-release versions after v1.6.0 and prior to v1.38.0 and cf-release versions after v244 and prior to v270, there is an incomplete fix for CVE-2017-8035. If you took steps to remediate CVE-2017-8035 you should also upgrade to fix this CVE. A carefully crafted CAPI request from a Space Developer can allow them to gain access to files on the Cloud Controller VM for that installation, aka an Information Leak / Disclosure." }, { "lang": "es", "value": "En Cloud Foundry Foundation CAPI-release en versiones posteriores a la v1.6.0 y anteriores a la v1.38.0 y cf-release en versiones posteriores a la v244 y anteriores a la v270 hay una soluci\u00f3n incompleta para CVE-2017-8035. Si ha emprendido acciones para solucionar CVE-2017-8035, tambi\u00e9n deber\u00eda actualizar para solucionar este CVE. Una petici\u00f3n CAPI especialmente manipulada desde un Space Developer puede permitir que atacantes obtengan acceso al Cloud Controller VM para tal instalaci\u00f3n. Esto tambi\u00e9n se conoce como (Fuga/Divulgaci\u00f3n de Informaci\u00f3n)." } ], "id": "CVE-2017-8037", "lastModified": "2024-11-21T03:33:11.857", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-21T22:29:00.183", "references": [ { "source": "security_alert@emc.com", "url": "http://www.securityfocus.com/bid/100448" }, { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-8037/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/100448" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-8037/" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-19 18:29
Modified
2024-11-21 03:59
Severity ?
Summary
In Cloud Controller versions prior to 1.46.0, cf-deployment versions prior to 1.3.0, and cf-release versions prior to 283, Cloud Controller accepts refresh tokens for authentication where access tokens are expected. This exposes a vulnerability where a refresh token that would otherwise be insufficient to obtain an access token, either due to lack of client credentials or revocation, would allow authentication.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://www.cloudfoundry.org/blog/cve-2018-1195/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cloudfoundry.org/blog/cve-2018-1195/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | capi-release | * | |
cloudfoundry | cf-deployment | * | |
cloudfoundry | cf-release | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5E43C5C-41F1-4E37-997C-C58F7DF241F2", "versionEndExcluding": "1.46.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FF5848C-C5E4-433E-916D-CE4B8D6D6F4C", "versionEndExcluding": "1.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "F79E262E-5BD6-4899-A12B-BC5BBA19B6A3", "versionEndExcluding": "283", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Cloud Controller versions prior to 1.46.0, cf-deployment versions prior to 1.3.0, and cf-release versions prior to 283, Cloud Controller accepts refresh tokens for authentication where access tokens are expected. This exposes a vulnerability where a refresh token that would otherwise be insufficient to obtain an access token, either due to lack of client credentials or revocation, would allow authentication." }, { "lang": "es", "value": "En Cloud Controller, en versiones anteriores a la 1.46.0, versiones cf-deployment anteriores a la 1.3.0 y versiones cf-release anteriores a la 283, Cloud Controller acepta tokens de actualizaci\u00f3n para autenticaci\u00f3n cuando se esperan tokens de acceso. Esto expone una vulnerabilidad donde un token de actualizaci\u00f3n que, de otra forma, ser\u00eda insuficiente para obtener un token de acceso, permita la autenticaci\u00f3n debido a la falta de credenciales o la revocaci\u00f3n." } ], "id": "CVE-2018-1195", "lastModified": "2024-11-21T03:59:22.380", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-19T18:29:00.327", "references": [ { "source": "security_alert@emc.com", "tags": [ "Third Party Advisory" ], "url": "https://www.cloudfoundry.org/blog/cve-2018-1195/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.cloudfoundry.org/blog/cve-2018-1195/" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-613" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-07-11 20:29
Modified
2024-11-21 02:42
Severity ?
Summary
Applications deployed to Cloud Foundry, versions v166 through v227, may be vulnerable to a remote disclosure of information, including, but not limited to environment variables and bound service details. For applications to be vulnerable, they must have been staged using automatic buildpack detection, passed through the Java Buildpack detection script, and allow the serving of static content from within the deployed artifact. The default Apache Tomcat configuration in the affected java buildpack versions for some basic web application archive (WAR) packaged applications are vulnerable to this issue.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://www.cloudfoundry.org/blog/cve-2016-0708/ | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cloudfoundry.org/blog/cve-2016-0708/ | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | cf-release | * | |
cloudfoundry | java_buildpack | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "702C39AA-F1A9-48C6-BA11-D0A12B20F3D4", "versionEndIncluding": "227", "versionStartIncluding": "166", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:java_buildpack:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C70F440-364D-412F-A05C-F170E7F9A463", "versionEndIncluding": "3.4", "versionStartIncluding": "2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Applications deployed to Cloud Foundry, versions v166 through v227, may be vulnerable to a remote disclosure of information, including, but not limited to environment variables and bound service details. For applications to be vulnerable, they must have been staged using automatic buildpack detection, passed through the Java Buildpack detection script, and allow the serving of static content from within the deployed artifact. The default Apache Tomcat configuration in the affected java buildpack versions for some basic web application archive (WAR) packaged applications are vulnerable to this issue." }, { "lang": "es", "value": "Las aplicaciones desplegadas en Cloud Foundry, desde la versi\u00f3n v166 hasta la v227, podr\u00edan ser vulnerables a una divulgaci\u00f3n de informaci\u00f3n remota que incluye, pero no se limita a, las variables de entorno y los detalles del servicio bound. Para que las aplicaciones sean vulnerables, deben haber sido preparadas mediante la detecci\u00f3n autom\u00e1tica de buildpack, pasadas a trav\u00e9s del script de detecci\u00f3n de Java Buildpack y deben permitir que se sirva contenido est\u00e1tico desde dentro del artefactos desplegados. La configuraci\u00f3n por defecto de Apache Tomcat en las versiones afectadas del Buildpack de Java para algunas aplicaciones WAR (web application archive) empaquetadas son vulnerables a este problema." } ], "id": "CVE-2016-0708", "lastModified": "2024-11-21T02:42:13.657", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-11T20:29:00.227", "references": [ { "source": "security_alert@emc.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/blog/cve-2016-0708/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/blog/cve-2016-0708/" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-04-18 16:29
Modified
2024-11-21 02:47
Severity ?
Summary
Cloud Foundry Cloud Controller, capi-release versions prior to 1.0.0 and cf-release versions prior to v237, contain a business logic flaw. An application developer may create an application with a route that conflicts with a platform service route and receive traffic intended for the service.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://github.com/cloudfoundry/cloud_controller_ng/issues/568 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/cloudfoundry/cloud_controller_ng/issues/568 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | capi-release | * | |
cloudfoundry | cloud_controller | - | |
cloudfoundry | cf-release | * | |
cloudfoundry | cloud_controller | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:capi-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CB85033-1C49-47DD-874D-1962B668F157", "versionEndExcluding": "1.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cloudfoundry:cloud_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A2640F7-395C-4609-A8CF-41A074F62C63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6DCEEBB-C1E0-4DCA-B9DE-9CA500A39BDF", "versionEndExcluding": "237", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cloudfoundry:cloud_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A2640F7-395C-4609-A8CF-41A074F62C63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cloud Foundry Cloud Controller, capi-release versions prior to 1.0.0 and cf-release versions prior to v237, contain a business logic flaw. An application developer may create an application with a route that conflicts with a platform service route and receive traffic intended for the service." }, { "lang": "es", "value": "Cloud Foundry Cloud Controller, capi-release en versiones anteriores a la 1.0.0 y cf-release en versiones anteriores a la v237, contienen un error de l\u00f3gica de negocio. Un desarrollador de aplicaciones puede crear una aplicaci\u00f3n con una ruta que entra en conflicto con una ruta de servicio de plataforma y recibir tr\u00e1fico destinado al servicio." } ], "id": "CVE-2016-2169", "lastModified": "2024-11-21T02:47:56.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-04-18T16:29:00.213", "references": [ { "source": "security_alert@emc.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/cloudfoundry/cloud_controller_ng/issues/568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/cloudfoundry/cloud_controller_ng/issues/568" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-17" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-29 22:29
Modified
2024-11-21 02:56
Severity ?
Summary
Applications in cf-release before 245 can be configured and pushed with a user-provided custom buildpack using a URL pointing to the buildpack. Although it is not recommended, a user can specify a credential in the URL (basic auth or OAuth) to access the buildpack through the CLI. For example, the user could include a GitHub username and password in the URL to access a private repo. Because the URL to access the buildpack is stored unencrypted, an operator with privileged access to the Cloud Controller database could view these credentials.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://pivotal.io/security/cve-2016-6658 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://pivotal.io/security/cve-2016-6658 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "381D7323-8A68-4814-9193-67B6EEC6678D", "versionEndExcluding": "245", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "40E584D4-7CA3-42E0-A9F3-79E67C111D65", "versionEndExcluding": "1.6.49", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DD51AC4-E544-4E15-BC72-D252D9773EA8", "versionEndExcluding": "1.7.31", "versionStartIncluding": "1.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "11FE44C3-64CB-499F-A81F-DFB6E8BA3EFE", "versionEndExcluding": "1.8.11", "versionStartIncluding": "1.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Applications in cf-release before 245 can be configured and pushed with a user-provided custom buildpack using a URL pointing to the buildpack. Although it is not recommended, a user can specify a credential in the URL (basic auth or OAuth) to access the buildpack through the CLI. For example, the user could include a GitHub username and password in the URL to access a private repo. Because the URL to access the buildpack is stored unencrypted, an operator with privileged access to the Cloud Controller database could view these credentials." }, { "lang": "es", "value": "Applications en cf-release, en versiones anteriores a la 245, puede configurarse e insertarse con un buildpack personalizado proporcionado por el usuario mediante una URL que se\u00f1ale al buildpack. Aunque no se recomienda, un usuario puede especificar una credencial en la URL (basic auth o OAuth) para acceder al buildpack a trav\u00e9s del CLI. Por ejemplo, el usuario puede incluir un nombre de usuario y contrase\u00f1a de GitHub en la URL para acceder a un repositorio privado. Debido a que la URL empleada para acceder al buildpack se almacena sin cifrar, un operador con acceso privilegiado a la base de datos de Cloud Controller podr\u00eda ver estas credenciales." } ], "id": "CVE-2016-6658", "lastModified": "2024-11-21T02:56:34.143", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.1, "impactScore": 5.8, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-29T22:29:00.477", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2016-6658" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2016-6658" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-10-04 01:29
Modified
2024-11-21 03:33
Severity ?
Summary
In Cloud Foundry capi-release versions 1.33.0 and later, prior to 1.42.0 and cf-release versions 268 and later, prior to 274, the original fix for CVE-2017-8033 introduces an API regression that allows a space developer to execute arbitrary code on the Cloud Controller VM by pushing a specially crafted application. NOTE: 274 resolves the vulnerability but has a serious bug that is fixed in 275.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://www.cloudfoundry.org/cve-2017-8048/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cloudfoundry.org/cve-2017-8048/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | cf-release | 268 | |
cloudfoundry | cf-release | 269 | |
cloudfoundry | cf-release | 270 | |
cloudfoundry | cf-release | 271 | |
cloudfoundry | cf-release | 272 | |
cloudfoundry | cf-release | 273 | |
pivotal | capi-release | 1.33.0 | |
pivotal | capi-release | 1.34.0 | |
pivotal | capi-release | 1.35.0 | |
pivotal | capi-release | 1.36.0 | |
pivotal | capi-release | 1.37.0 | |
pivotal | capi-release | 1.38.0 | |
pivotal | capi-release | 1.39.0 | |
pivotal | capi-release | 1.40.0 | |
pivotal | capi-release | 1.41.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:268:*:*:*:*:*:*:*", "matchCriteriaId": "735E1016-97F0-4286-955F-6017A2F8AD79", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:269:*:*:*:*:*:*:*", "matchCriteriaId": "F021AB15-30F0-46DE-B613-11E3D4C9FD50", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:270:*:*:*:*:*:*:*", "matchCriteriaId": "55F6F25E-B163-4587-A5B0-38D06E79F9EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:271:*:*:*:*:*:*:*", "matchCriteriaId": "3C362BD6-2F2B-41F5-85B4-8EF412C52FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:272:*:*:*:*:*:*:*", "matchCriteriaId": "D97DC93C-8944-412F-8F5D-1CE29BA1E53B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:273:*:*:*:*:*:*:*", "matchCriteriaId": "3C4D07FC-7A86-4B9E-BF2C-382BB0DA8F00", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:capi-release:1.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "5EA3D640-F0F2-4F0A-9B7D-6ADD356A0620", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:capi-release:1.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9A2F496-2DC2-4715-AE3C-2D1B4F7FC42E", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:capi-release:1.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "182CF381-85D1-4FD5-A4A7-77ECE267BD01", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:capi-release:1.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "A011CFE7-9F6C-4584-A600-27A0605DD424", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:capi-release:1.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2158F3B-2746-4E15-87C5-39CAE6EB2163", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:capi-release:1.38.0:*:*:*:*:*:*:*", "matchCriteriaId": "36AABE9B-DAB9-41CA-AFE2-AC6F8C37F207", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:capi-release:1.39.0:*:*:*:*:*:*:*", "matchCriteriaId": "664569DC-51E7-4C6E-ACED-D382A261B878", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:capi-release:1.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "BF614F71-E9DF-4B90-B503-1618AA79B707", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal:capi-release:1.41.0:*:*:*:*:*:*:*", "matchCriteriaId": "1960B595-6BAC-489D-9534-6894C3C5F019", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Cloud Foundry capi-release versions 1.33.0 and later, prior to 1.42.0 and cf-release versions 268 and later, prior to 274, the original fix for CVE-2017-8033 introduces an API regression that allows a space developer to execute arbitrary code on the Cloud Controller VM by pushing a specially crafted application. NOTE: 274 resolves the vulnerability but has a serious bug that is fixed in 275." }, { "lang": "es", "value": "En las versiones de la 1.33.0 hasta la 1.42.0 del desarrollo capi-release y las versiones de la 268 hasta la 274 (no inclusive) del desarrollo cf-release de Cloud Foundry, la soluci\u00f3n original para CVE-2017-8033 introduce una regresi\u00f3n de API que permite que un desarrollador de espacio ejecute c\u00f3digo arbitrario en la m\u00e1quina virtual de Cloud Controller abriendo una aplicaci\u00f3n especialmente manipulada. NOTA: 274 resuelve la vulnerabilidad pero tiene un error grave que se resuelve en 275." } ], "id": "CVE-2017-8048", "lastModified": "2024-11-21T03:33:13.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-04T01:29:03.653", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-8048/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2017-8048/" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-05-25 17:29
Modified
2024-11-21 02:28
Severity ?
Summary
With Cloud Foundry Runtime cf-release versions v208 or earlier, UAA Standalone versions 2.2.5 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier, old Password Reset Links are not expired after the user changes their current email address to a new one. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://pivotal.io/security/cve-2015-3189 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://pivotal.io/security/cve-2015-3189 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | cf-release | * | |
pivotal_software | cloud_foundry_elastic_runtime | * | |
pivotal_software | cloud_foundry_uaa | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "F11FD354-9940-4745-BF27-19108E2E567E", "versionEndIncluding": "208", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB6812A0-8836-4F25-9AC1-DB552BC605ED", "versionEndIncluding": "1.4.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F876A8B-AA8F-4DAD-B840-6CDF1076AF9D", "versionEndIncluding": "2.2.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "With Cloud Foundry Runtime cf-release versions v208 or earlier, UAA Standalone versions 2.2.5 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier, old Password Reset Links are not expired after the user changes their current email address to a new one. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected." }, { "lang": "es", "value": "En Cloud Foundry Runtime versiones v208 y anteriores, UAA Standalone versiones 2.2.5 o anteriores y Pivotal Cloud Foundry Runtime, versiones 1.4.5 o anteriores, los enlaces a contrase\u00f1as antiguas reseteadas no expiran despu\u00e9s de que un usuario cambie su direcci\u00f3n de correo electr\u00f3nico actual a una nueva. Esta vulnerabilidad aplica solo cuando se almacena el UAA del usuario interno para la autenticaci\u00f3n. Despliegues habilitados para la integraci\u00f3n a trav\u00e9s de SAML o LDAP no estar\u00edan afectados." } ], "id": "CVE-2015-3189", "lastModified": "2024-11-21T02:28:51.873", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-05-25T17:29:00.333", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2015-3189" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2015-3189" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-640" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-06-13 06:29
Modified
2024-11-21 02:56
Severity ?
Summary
An issue was discovered in Cloud Foundry Foundation Cloud Foundry release versions prior to v245 and cf-mysql-release versions prior to v31. A command injection vulnerability was discovered in a common script used by many Cloud Foundry components. A malicious user may exploit numerous vectors to execute arbitrary commands on servers running Cloud Foundry.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | http://www.securityfocus.com/bid/93889 | Third Party Advisory, VDB Entry | |
security_alert@emc.com | https://www.cloudfoundry.org/cve-2016-6655/ | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/93889 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cloudfoundry.org/cve-2016-6655/ | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cloudfoundry | cf-mysql-release | * | |
cloudfoundry | cf-release | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudfoundry:cf-mysql-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "503F79C0-4F12-4AA0-8902-12217C476BBC", "versionEndIncluding": "30", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A9D6FC7-3CB5-4C15-A0F3-E64577C72EAB", "versionEndIncluding": "244", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation Cloud Foundry release versions prior to v245 and cf-mysql-release versions prior to v31. A command injection vulnerability was discovered in a common script used by many Cloud Foundry components. A malicious user may exploit numerous vectors to execute arbitrary commands on servers running Cloud Foundry." }, { "lang": "es", "value": "Un problema fue descubierto en Cloud Foundry Foundation Cloud Foundry liberado en versiones anteriores a la v245 y cf-mysql liberado anterior a la v31. Una inyecci\u00f3n de comando fue descubierta en un script com\u00fan usado por varios componentes de Cloud Foundry. Un usuario malicioso podr\u00eda explotar numerosos vectores para ejecutar comando arbitrarios en servidores con Cloud Foundry ejecut\u00e1ndose." } ], "id": "CVE-2016-6655", "lastModified": "2024-11-21T02:56:33.757", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-13T06:29:00.190", "references": [ { "source": "security_alert@emc.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93889" }, { "source": "security_alert@emc.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2016-6655/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.cloudfoundry.org/cve-2016-6655/" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2017-8048
Vulnerability from cvelistv5
Published
2017-10-03 07:00
Modified
2024-08-05 16:19
Severity ?
EPSS score ?
Summary
In Cloud Foundry capi-release versions 1.33.0 and later, prior to 1.42.0 and cf-release versions 268 and later, prior to 274, the original fix for CVE-2017-8033 introduces an API regression that allows a space developer to execute arbitrary code on the Cloud Controller VM by pushing a specially crafted application. NOTE: 274 resolves the vulnerability but has a serious bug that is fixed in 275.
References
▼ | URL | Tags |
---|---|---|
https://www.cloudfoundry.org/cve-2017-8048/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cloud Controller VM capi-release versions 1.33.0 and later, prior to 1.42.0, cf-release versions 268 and later, prior to 274 |
Version: Cloud Controller VM capi-release versions 1.33.0 and later, prior to 1.42.0, cf-release versions 268 and later, prior to 274 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:19:29.629Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/cve-2017-8048/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Controller VM capi-release versions 1.33.0 and later, prior to 1.42.0, cf-release versions 268 and later, prior to 274", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cloud Controller VM capi-release versions 1.33.0 and later, prior to 1.42.0, cf-release versions 268 and later, prior to 274" } ] } ], "datePublic": "2017-10-03T00:00:00", "descriptions": [ { "lang": "en", "value": "In Cloud Foundry capi-release versions 1.33.0 and later, prior to 1.42.0 and cf-release versions 268 and later, prior to 274, the original fix for CVE-2017-8033 introduces an API regression that allows a space developer to execute arbitrary code on the Cloud Controller VM by pushing a specially crafted application. NOTE: 274 resolves the vulnerability but has a serious bug that is fixed in 275." } ], "problemTypes": [ { "descriptions": [ { "description": "API regression", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-03T06:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/cve-2017-8048/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2017-8048", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Controller VM capi-release versions 1.33.0 and later, prior to 1.42.0, cf-release versions 268 and later, prior to 274", "version": { "version_data": [ { "version_value": "Cloud Controller VM capi-release versions 1.33.0 and later, prior to 1.42.0, cf-release versions 268 and later, prior to 274" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Cloud Foundry capi-release versions 1.33.0 and later, prior to 1.42.0 and cf-release versions 268 and later, prior to 274, the original fix for CVE-2017-8033 introduces an API regression that allows a space developer to execute arbitrary code on the Cloud Controller VM by pushing a specially crafted application. NOTE: 274 resolves the vulnerability but has a serious bug that is fixed in 275." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "API regression" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cloudfoundry.org/cve-2017-8048/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/cve-2017-8048/" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2017-8048", "datePublished": "2017-10-03T07:00:00", "dateReserved": "2017-04-21T00:00:00", "dateUpdated": "2024-08-05T16:19:29.629Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-8035
Vulnerability from cvelistv5
Published
2017-07-25 04:00
Modified
2024-08-05 16:19
Severity ?
EPSS score ?
Summary
An issue was discovered in the Cloud Controller API in Cloud Foundry Foundation CAPI-release versions after v1.6.0 and prior to v1.35.0 and cf-release versions after v244 and prior to v268. A carefully crafted CAPI request from a Space Developer can allow them to gain access to files on the Cloud Controller VM for that installation.
References
▼ | URL | Tags |
---|---|---|
https://www.cloudfoundry.org/cve-2017-8035/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cloud Controller |
Version: Cloud Controller |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:19:29.718Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/cve-2017-8035/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Controller", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cloud Controller" } ] } ], "datePublic": "2017-07-24T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Cloud Controller API in Cloud Foundry Foundation CAPI-release versions after v1.6.0 and prior to v1.35.0 and cf-release versions after v244 and prior to v268. A carefully crafted CAPI request from a Space Developer can allow them to gain access to files on the Cloud Controller VM for that installation." } ], "problemTypes": [ { "descriptions": [ { "description": "API access to CC VM contents", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-25T03:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/cve-2017-8035/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2017-8035", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Controller", "version": { "version_data": [ { "version_value": "Cloud Controller" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the Cloud Controller API in Cloud Foundry Foundation CAPI-release versions after v1.6.0 and prior to v1.35.0 and cf-release versions after v244 and prior to v268. A carefully crafted CAPI request from a Space Developer can allow them to gain access to files on the Cloud Controller VM for that installation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "API access to CC VM contents" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cloudfoundry.org/cve-2017-8035/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/cve-2017-8035/" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2017-8035", "datePublished": "2017-07-25T04:00:00", "dateReserved": "2017-04-21T00:00:00", "dateUpdated": "2024-08-05T16:19:29.718Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-9882
Vulnerability from cvelistv5
Published
2017-01-13 09:00
Modified
2024-08-06 03:07
Severity ?
EPSS score ?
Summary
An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v250 and CAPI-release versions prior to v1.12.0. Cloud Foundry logs the credentials returned from service brokers in Cloud Controller system component logs. These logs are written to disk and often sent to a log aggregator via syslog.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/95441 | vdb-entry, x_refsource_BID | |
https://www.cloudfoundry.org/cve-2016-9882/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cloud Foundry Foundation cf-release versions prior to v250 and CAPI-release versions prior to v1.12.0 |
Version: Cloud Foundry Foundation cf-release versions prior to v250 and CAPI-release versions prior to v1.12.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T03:07:30.857Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "95441", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/95441" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/cve-2016-9882/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Foundry Foundation cf-release versions prior to v250 and CAPI-release versions prior to v1.12.0", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cloud Foundry Foundation cf-release versions prior to v250 and CAPI-release versions prior to v1.12.0" } ] } ], "datePublic": "2017-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v250 and CAPI-release versions prior to v1.12.0. Cloud Foundry logs the credentials returned from service brokers in Cloud Controller system component logs. These logs are written to disk and often sent to a log aggregator via syslog." } ], "problemTypes": [ { "descriptions": [ { "description": "Logs Service Credentials", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-17T10:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "name": "95441", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/95441" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/cve-2016-9882/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2016-9882", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Foundry Foundation cf-release versions prior to v250 and CAPI-release versions prior to v1.12.0", "version": { "version_data": [ { "version_value": "Cloud Foundry Foundation cf-release versions prior to v250 and CAPI-release versions prior to v1.12.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v250 and CAPI-release versions prior to v1.12.0. Cloud Foundry logs the credentials returned from service brokers in Cloud Controller system component logs. These logs are written to disk and often sent to a log aggregator via syslog." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Logs Service Credentials" } ] } ] }, "references": { "reference_data": [ { "name": "95441", "refsource": "BID", "url": "http://www.securityfocus.com/bid/95441" }, { "name": "https://www.cloudfoundry.org/cve-2016-9882/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/cve-2016-9882/" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2016-9882", "datePublished": "2017-01-13T09:00:00", "dateReserved": "2016-12-06T00:00:00", "dateUpdated": "2024-08-06T03:07:30.857Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-3189
Vulnerability from cvelistv5
Published
2017-05-25 17:00
Modified
2024-08-06 05:39
Severity ?
EPSS score ?
Summary
With Cloud Foundry Runtime cf-release versions v208 or earlier, UAA Standalone versions 2.2.5 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier, old Password Reset Links are not expired after the user changes their current email address to a new one. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected.
References
▼ | URL | Tags |
---|---|---|
https://pivotal.io/security/cve-2015-3189 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Pivotal | Cloud Foundry |
Version: Runtime cf-release versions v208 or earlier Version: UAA Standalone versions 2.2.5 or earlier Version: Runtime 1.4.5 or earlier |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:39:32.005Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pivotal.io/security/cve-2015-3189" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Foundry", "vendor": "Pivotal", "versions": [ { "status": "affected", "version": "Runtime cf-release versions v208 or earlier" }, { "status": "affected", "version": "UAA Standalone versions 2.2.5 or earlier" }, { "status": "affected", "version": "Runtime 1.4.5 or earlier" } ] } ], "datePublic": "2015-06-25T00:00:00", "descriptions": [ { "lang": "en", "value": "With Cloud Foundry Runtime cf-release versions v208 or earlier, UAA Standalone versions 2.2.5 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier, old Password Reset Links are not expired after the user changes their current email address to a new one. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Password reset weakness", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-05-25T16:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pivotal.io/security/cve-2015-3189" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2015-3189", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Foundry", "version": { "version_data": [ { "version_value": "Runtime cf-release versions v208 or earlier" }, { "version_value": "UAA Standalone versions 2.2.5 or earlier" }, { "version_value": "Runtime 1.4.5 or earlier" } ] } } ] }, "vendor_name": "Pivotal" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "With Cloud Foundry Runtime cf-release versions v208 or earlier, UAA Standalone versions 2.2.5 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier, old Password Reset Links are not expired after the user changes their current email address to a new one. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Password reset weakness" } ] } ] }, "references": { "reference_data": [ { "name": "https://pivotal.io/security/cve-2015-3189", "refsource": "CONFIRM", "url": "https://pivotal.io/security/cve-2015-3189" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2015-3189", "datePublished": "2017-05-25T17:00:00", "dateReserved": "2015-04-10T00:00:00", "dateUpdated": "2024-08-06T05:39:32.005Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-3191
Vulnerability from cvelistv5
Published
2017-05-25 17:00
Modified
2024-08-06 05:39
Severity ?
EPSS score ?
Summary
With Cloud Foundry Runtime cf-release versions v209 or earlier, UAA Standalone versions 2.2.6 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier the change_email form in UAA is vulnerable to a CSRF attack. This allows an attacker to trigger an e-mail change for a user logged into a cloud foundry instance via a malicious link on a attacker controlled site. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected.
References
▼ | URL | Tags |
---|---|---|
https://pivotal.io/security/cve-2015-3191 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Pivotal | Cloud Foundry |
Version: Runtime cf-release versions v209 or earlier Version: UAA Standalone versions 2.2.6 or earlier Version: Runtime 1.4.5 or earlier |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:39:31.578Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pivotal.io/security/cve-2015-3191" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Foundry", "vendor": "Pivotal", "versions": [ { "status": "affected", "version": "Runtime cf-release versions v209 or earlier" }, { "status": "affected", "version": "UAA Standalone versions 2.2.6 or earlier" }, { "status": "affected", "version": "Runtime 1.4.5 or earlier" } ] } ], "datePublic": "2015-06-25T00:00:00", "descriptions": [ { "lang": "en", "value": "With Cloud Foundry Runtime cf-release versions v209 or earlier, UAA Standalone versions 2.2.6 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier the change_email form in UAA is vulnerable to a CSRF attack. This allows an attacker to trigger an e-mail change for a user logged into a cloud foundry instance via a malicious link on a attacker controlled site. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected." } ], "problemTypes": [ { "descriptions": [ { "description": "CSRF", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-05-25T16:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pivotal.io/security/cve-2015-3191" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2015-3191", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Foundry", "version": { "version_data": [ { "version_value": "Runtime cf-release versions v209 or earlier" }, { "version_value": "UAA Standalone versions 2.2.6 or earlier" }, { "version_value": "Runtime 1.4.5 or earlier" } ] } } ] }, "vendor_name": "Pivotal" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "With Cloud Foundry Runtime cf-release versions v209 or earlier, UAA Standalone versions 2.2.6 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier the change_email form in UAA is vulnerable to a CSRF attack. This allows an attacker to trigger an e-mail change for a user logged into a cloud foundry instance via a malicious link on a attacker controlled site. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CSRF" } ] } ] }, "references": { "reference_data": [ { "name": "https://pivotal.io/security/cve-2015-3191", "refsource": "CONFIRM", "url": "https://pivotal.io/security/cve-2015-3191" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2015-3191", "datePublished": "2017-05-25T17:00:00", "dateReserved": "2015-04-10T00:00:00", "dateUpdated": "2024-08-06T05:39:31.578Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-2165
Vulnerability from cvelistv5
Published
2017-05-25 17:00
Modified
2024-08-05 23:17
Severity ?
EPSS score ?
Summary
The Loggregator Traffic Controller endpoints in cf-release v231 and lower, Pivotal Elastic Runtime versions prior to 1.5.19 AND 1.6.x versions prior to 1.6.20 are not cleansing request URL paths when they are invalid and are returning them in the 404 response. This could allow malicious scripts to be written directly into the 404 response.
References
▼ | URL | Tags |
---|---|---|
https://pivotal.io/security/cve-2016-2165 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Pivotal | Cloud Foundry |
Version: cf-release v231 and lower Version: Elastic Runtime versions prior to 1.5.19 AND 1.6.x versions prior to 1.6.20 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:17:50.673Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pivotal.io/security/cve-2016-2165" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Foundry", "vendor": "Pivotal", "versions": [ { "status": "affected", "version": "cf-release v231 and lower" }, { "status": "affected", "version": "Elastic Runtime versions prior to 1.5.19 AND 1.6.x versions prior to 1.6.20" } ] } ], "datePublic": "2016-03-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The Loggregator Traffic Controller endpoints in cf-release v231 and lower, Pivotal Elastic Runtime versions prior to 1.5.19 AND 1.6.x versions prior to 1.6.20 are not cleansing request URL paths when they are invalid and are returning them in the 404 response. This could allow malicious scripts to be written directly into the 404 response." } ], "problemTypes": [ { "descriptions": [ { "description": "XSS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-05-25T16:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pivotal.io/security/cve-2016-2165" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2016-2165", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Foundry", "version": { "version_data": [ { "version_value": "cf-release v231 and lower" }, { "version_value": "Elastic Runtime versions prior to 1.5.19 AND 1.6.x versions prior to 1.6.20" } ] } } ] }, "vendor_name": "Pivotal" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Loggregator Traffic Controller endpoints in cf-release v231 and lower, Pivotal Elastic Runtime versions prior to 1.5.19 AND 1.6.x versions prior to 1.6.20 are not cleansing request URL paths when they are invalid and are returning them in the 404 response. This could allow malicious scripts to be written directly into the 404 response." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "XSS" } ] } ] }, "references": { "reference_data": [ { "name": "https://pivotal.io/security/cve-2016-2165", "refsource": "CONFIRM", "url": "https://pivotal.io/security/cve-2016-2165" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2016-2165", "datePublished": "2017-05-25T17:00:00", "dateReserved": "2016-01-29T00:00:00", "dateUpdated": "2024-08-05T23:17:50.673Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-8047
Vulnerability from cvelistv5
Published
2017-10-03 07:00
Modified
2024-08-05 16:19
Severity ?
EPSS score ?
Summary
In Cloud Foundry router routing-release all versions prior to v0.163.0 and cf-release all versions prior to v274, in some applications, it is possible to append a combination of characters to the URL that will allow for an open redirect. An attacker could exploit this as a phishing attack to gain access to user credentials or other sensitive data. NOTE: 274 resolves the vulnerability but has a serious bug that is fixed in 275.
References
▼ | URL | Tags |
---|---|---|
https://www.cloudfoundry.org/cve-2017-8047/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cloud Foundry router routing-release all versions prior to v0.163.0 and cf-release all versions prior to v274 |
Version: Cloud Foundry router routing-release all versions prior to v0.163.0 and cf-release all versions prior to v274 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:19:29.849Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/cve-2017-8047/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Foundry router routing-release all versions prior to v0.163.0 and cf-release all versions prior to v274", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cloud Foundry router routing-release all versions prior to v0.163.0 and cf-release all versions prior to v274" } ] } ], "datePublic": "2017-10-03T00:00:00", "descriptions": [ { "lang": "en", "value": "In Cloud Foundry router routing-release all versions prior to v0.163.0 and cf-release all versions prior to v274, in some applications, it is possible to append a combination of characters to the URL that will allow for an open redirect. An attacker could exploit this as a phishing attack to gain access to user credentials or other sensitive data. NOTE: 274 resolves the vulnerability but has a serious bug that is fixed in 275." } ], "problemTypes": [ { "descriptions": [ { "description": "open redirect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-03T06:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/cve-2017-8047/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2017-8047", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Foundry router routing-release all versions prior to v0.163.0 and cf-release all versions prior to v274", "version": { "version_data": [ { "version_value": "Cloud Foundry router routing-release all versions prior to v0.163.0 and cf-release all versions prior to v274" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Cloud Foundry router routing-release all versions prior to v0.163.0 and cf-release all versions prior to v274, in some applications, it is possible to append a combination of characters to the URL that will allow for an open redirect. An attacker could exploit this as a phishing attack to gain access to user credentials or other sensitive data. NOTE: 274 resolves the vulnerability but has a serious bug that is fixed in 275." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "open redirect" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cloudfoundry.org/cve-2017-8047/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/cve-2017-8047/" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2017-8047", "datePublished": "2017-10-03T07:00:00", "dateReserved": "2017-04-21T00:00:00", "dateUpdated": "2024-08-05T16:19:29.849Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-0732
Vulnerability from cvelistv5
Published
2017-09-07 13:00
Modified
2024-08-05 22:30
Severity ?
EPSS score ?
Summary
The identity zones feature in Pivotal Cloud Foundry 208 through 229; UAA 2.0.0 through 2.7.3 and 3.0.0; UAA-Release 2 through 4, when configured with multiple identity zones; and Elastic Runtime 1.6.0 through 1.6.13 allows remote authenticated users with privileges in one zone to gain privileges and perform operations on a different zone via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://pivotal.io/security/cve-2016-0732 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:30:03.949Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pivotal.io/security/cve-2016-0732" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The identity zones feature in Pivotal Cloud Foundry 208 through 229; UAA 2.0.0 through 2.7.3 and 3.0.0; UAA-Release 2 through 4, when configured with multiple identity zones; and Elastic Runtime 1.6.0 through 1.6.13 allows remote authenticated users with privileges in one zone to gain privileges and perform operations on a different zone via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pivotal.io/security/cve-2016-0732" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-0732", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The identity zones feature in Pivotal Cloud Foundry 208 through 229; UAA 2.0.0 through 2.7.3 and 3.0.0; UAA-Release 2 through 4, when configured with multiple identity zones; and Elastic Runtime 1.6.0 through 1.6.13 allows remote authenticated users with privileges in one zone to gain privileges and perform operations on a different zone via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://pivotal.io/security/cve-2016-0732", "refsource": "CONFIRM", "url": "https://pivotal.io/security/cve-2016-0732" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-0732", "datePublished": "2017-09-07T13:00:00", "dateReserved": "2015-12-16T00:00:00", "dateUpdated": "2024-08-05T22:30:03.949Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-4969
Vulnerability from cvelistv5
Published
2017-04-20 22:00
Modified
2024-08-05 14:47
Severity ?
EPSS score ?
Summary
The Cloud Controller in Cloud Foundry cf-release versions prior to v255 allows authenticated developer users to exceed memory and disk quotas for tasks.
References
▼ | URL | Tags |
---|---|---|
https://www.cloudfoundry.org/cve-2017-4969/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cloud Foundry Cloud Controller cf-release versions prior to v255 |
Version: Cloud Foundry Cloud Controller cf-release versions prior to v255 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:47:44.132Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/cve-2017-4969/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Foundry Cloud Controller cf-release versions prior to v255", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cloud Foundry Cloud Controller cf-release versions prior to v255" } ] } ], "datePublic": "2017-04-20T00:00:00", "descriptions": [ { "lang": "en", "value": "The Cloud Controller in Cloud Foundry cf-release versions prior to v255 allows authenticated developer users to exceed memory and disk quotas for tasks." } ], "problemTypes": [ { "descriptions": [ { "description": "Authenticated developer users to exceed memory and disk quotas for tasks", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-20T21:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/cve-2017-4969/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2017-4969", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Foundry Cloud Controller cf-release versions prior to v255", "version": { "version_data": [ { "version_value": "Cloud Foundry Cloud Controller cf-release versions prior to v255" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Cloud Controller in Cloud Foundry cf-release versions prior to v255 allows authenticated developer users to exceed memory and disk quotas for tasks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authenticated developer users to exceed memory and disk quotas for tasks" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cloudfoundry.org/cve-2017-4969/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/cve-2017-4969/" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2017-4969", "datePublished": "2017-04-20T22:00:00", "dateReserved": "2016-12-29T00:00:00", "dateUpdated": "2024-08-05T14:47:44.132Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-0713
Vulnerability from cvelistv5
Published
2017-08-31 14:00
Modified
2024-08-05 22:30
Severity ?
EPSS score ?
Summary
Gorouter in Cloud Foundry cf-release v141 through v228 allows man-in-the-middle attackers to conduct cross-site scripting (XSS) attacks via vectors related to modified requests.
References
▼ | URL | Tags |
---|---|---|
https://lists.cloudfoundry.org/archives/list/cf-dev%40lists.cloudfoundry.org/thread/VWDLUNTDKW5CW5JWEM5BOHLJ3J32TAFF/ | mailing-list, x_refsource_MLIST | |
https://bosh.io/releases/github.com/cloudfoundry/cf-release?version=229 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:30:03.569Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[cf-dev] 20160201 CVE-2016-0713 Gorouter XSS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.cloudfoundry.org/archives/list/cf-dev%40lists.cloudfoundry.org/thread/VWDLUNTDKW5CW5JWEM5BOHLJ3J32TAFF/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bosh.io/releases/github.com/cloudfoundry/cf-release?version=229" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-02-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Gorouter in Cloud Foundry cf-release v141 through v228 allows man-in-the-middle attackers to conduct cross-site scripting (XSS) attacks via vectors related to modified requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-31T13:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[cf-dev] 20160201 CVE-2016-0713 Gorouter XSS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.cloudfoundry.org/archives/list/cf-dev%40lists.cloudfoundry.org/thread/VWDLUNTDKW5CW5JWEM5BOHLJ3J32TAFF/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bosh.io/releases/github.com/cloudfoundry/cf-release?version=229" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-0713", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Gorouter in Cloud Foundry cf-release v141 through v228 allows man-in-the-middle attackers to conduct cross-site scripting (XSS) attacks via vectors related to modified requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[cf-dev] 20160201 CVE-2016-0713 Gorouter XSS", "refsource": "MLIST", "url": "https://lists.cloudfoundry.org/archives/list/cf-dev@lists.cloudfoundry.org/thread/VWDLUNTDKW5CW5JWEM5BOHLJ3J32TAFF/" }, { "name": "https://bosh.io/releases/github.com/cloudfoundry/cf-release?version=229", "refsource": "CONFIRM", "url": "https://bosh.io/releases/github.com/cloudfoundry/cf-release?version=229" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-0713", "datePublished": "2017-08-31T14:00:00", "dateReserved": "2015-12-16T00:00:00", "dateUpdated": "2024-08-05T22:30:03.569Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-1834
Vulnerability from cvelistv5
Published
2017-05-25 17:00
Modified
2024-08-06 04:54
Severity ?
EPSS score ?
Summary
A path traversal vulnerability was identified in the Cloud Foundry component Cloud Controller that affects cf-release versions prior to v208 and Pivotal Cloud Foundry Elastic Runtime versions prior to 1.4.2. Path traversal is the 'outbreak' of a given directory structure through relative file paths in the user input. It aims at accessing files and directories that are stored outside the web root folder, for disallowed reading or even executing arbitrary system commands. An attacker could use a certain parameter of the file path for instance to inject '../' sequences in order to navigate through the file system. In this particular case a remote authenticated attacker can exploit the identified vulnerability in order to upload arbitrary files to the server running a Cloud Controller instance - outside the isolated application container.
References
▼ | URL | Tags |
---|---|---|
https://pivotal.io/security/cve-2015-1834 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/98691 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Pivotal | Cloud Foundry |
Version: cf-release versions prior to v208 Version: Elastic Runtime versions prior to 1.4.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:54:16.330Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pivotal.io/security/cve-2015-1834" }, { "name": "98691", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/98691" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Foundry", "vendor": "Pivotal", "versions": [ { "status": "affected", "version": "cf-release versions prior to v208" }, { "status": "affected", "version": "Elastic Runtime versions prior to 1.4.2" } ] } ], "datePublic": "2015-05-22T00:00:00", "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability was identified in the Cloud Foundry component Cloud Controller that affects cf-release versions prior to v208 and Pivotal Cloud Foundry Elastic Runtime versions prior to 1.4.2. Path traversal is the \u0027outbreak\u0027 of a given directory structure through relative file paths in the user input. It aims at accessing files and directories that are stored outside the web root folder, for disallowed reading or even executing arbitrary system commands. An attacker could use a certain parameter of the file path for instance to inject \u0027../\u0027 sequences in order to navigate through the file system. In this particular case a remote authenticated attacker can exploit the identified vulnerability in order to upload arbitrary files to the server running a Cloud Controller instance - outside the isolated application container." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-05-29T09:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pivotal.io/security/cve-2015-1834" }, { "name": "98691", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/98691" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2015-1834", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Foundry", "version": { "version_data": [ { "version_value": "cf-release versions prior to v208" }, { "version_value": "Elastic Runtime versions prior to 1.4.2" } ] } } ] }, "vendor_name": "Pivotal" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A path traversal vulnerability was identified in the Cloud Foundry component Cloud Controller that affects cf-release versions prior to v208 and Pivotal Cloud Foundry Elastic Runtime versions prior to 1.4.2. Path traversal is the \u0027outbreak\u0027 of a given directory structure through relative file paths in the user input. It aims at accessing files and directories that are stored outside the web root folder, for disallowed reading or even executing arbitrary system commands. An attacker could use a certain parameter of the file path for instance to inject \u0027../\u0027 sequences in order to navigate through the file system. In this particular case a remote authenticated attacker can exploit the identified vulnerability in order to upload arbitrary files to the server running a Cloud Controller instance - outside the isolated application container." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://pivotal.io/security/cve-2015-1834", "refsource": "CONFIRM", "url": "https://pivotal.io/security/cve-2015-1834" }, { "name": "98691", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98691" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2015-1834", "datePublished": "2017-05-25T17:00:00", "dateReserved": "2015-02-17T00:00:00", "dateUpdated": "2024-08-06T04:54:16.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5173
Vulnerability from cvelistv5
Published
2017-10-24 17:00
Modified
2024-08-06 06:41
Severity ?
EPSS score ?
Summary
Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact via vectors involving emails with password recovery links, aka "Cross Domain Referer Leakage."
References
▼ | URL | Tags |
---|---|---|
https://pivotal.io/security/cve-2015-5170-5173 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:41:08.841Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pivotal.io/security/cve-2015-5170-5173" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact via vectors involving emails with password recovery links, aka \"Cross Domain Referer Leakage.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-24T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pivotal.io/security/cve-2015-5170-5173" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5173", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact via vectors involving emails with password recovery links, aka \"Cross Domain Referer Leakage.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://pivotal.io/security/cve-2015-5170-5173", "refsource": "CONFIRM", "url": "https://pivotal.io/security/cve-2015-5170-5173" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-5173", "datePublished": "2017-10-24T17:00:00", "dateReserved": "2015-07-01T00:00:00", "dateUpdated": "2024-08-06T06:41:08.841Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1195
Vulnerability from cvelistv5
Published
2018-03-19 18:00
Modified
2024-09-16 20:52
Severity ?
EPSS score ?
Summary
In Cloud Controller versions prior to 1.46.0, cf-deployment versions prior to 1.3.0, and cf-release versions prior to 283, Cloud Controller accepts refresh tokens for authentication where access tokens are expected. This exposes a vulnerability where a refresh token that would otherwise be insufficient to obtain an access token, either due to lack of client credentials or revocation, would allow authentication.
References
▼ | URL | Tags |
---|---|---|
https://www.cloudfoundry.org/blog/cve-2018-1195/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell EMC | Cloud Controller |
Version: You are using Cloud Controller version prior to 1.46.0 Version: You are using cf-deployment version prior to 1.3.0 Version: You are using cf-release version prior to 283 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:51:48.983Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/blog/cve-2018-1195/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Controller", "vendor": "Dell EMC", "versions": [ { "status": "affected", "version": "You are using Cloud Controller version prior to 1.46.0" }, { "status": "affected", "version": "You are using cf-deployment version prior to 1.3.0" }, { "status": "affected", "version": "You are using cf-release version prior to 283" } ] } ], "datePublic": "2018-03-05T00:00:00", "descriptions": [ { "lang": "en", "value": "In Cloud Controller versions prior to 1.46.0, cf-deployment versions prior to 1.3.0, and cf-release versions prior to 283, Cloud Controller accepts refresh tokens for authentication where access tokens are expected. This exposes a vulnerability where a refresh token that would otherwise be insufficient to obtain an access token, either due to lack of client credentials or revocation, would allow authentication." } ], "problemTypes": [ { "descriptions": [ { "description": "API will accept a refresh token for authentication", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-19T17:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/blog/cve-2018-1195/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "DATE_PUBLIC": "2018-03-05T00:00:00", "ID": "CVE-2018-1195", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Controller", "version": { "version_data": [ { "version_value": "You are using Cloud Controller version prior to 1.46.0" }, { "version_value": "You are using cf-deployment version prior to 1.3.0" }, { "version_value": "You are using cf-release version prior to 283" } ] } } ] }, "vendor_name": "Dell EMC" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Cloud Controller versions prior to 1.46.0, cf-deployment versions prior to 1.3.0, and cf-release versions prior to 283, Cloud Controller accepts refresh tokens for authentication where access tokens are expected. This exposes a vulnerability where a refresh token that would otherwise be insufficient to obtain an access token, either due to lack of client credentials or revocation, would allow authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "API will accept a refresh token for authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cloudfoundry.org/blog/cve-2018-1195/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/blog/cve-2018-1195/" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2018-1195", "datePublished": "2018-03-19T18:00:00Z", "dateReserved": "2017-12-06T00:00:00", "dateUpdated": "2024-09-16T20:52:50.610Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-4974
Vulnerability from cvelistv5
Published
2017-06-13 06:00
Modified
2024-08-05 14:47
Severity ?
EPSS score ?
Summary
An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v258; UAA release 2.x versions prior to v2.7.4.15, 3.6.x versions prior to v3.6.9, 3.9.x versions prior to v3.9.11, and other versions prior to v3.16.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.13, 24.x versions prior to v24.8, and other versions prior to v30.1. An authorized user can use a blind SQL injection attack to query the contents of the UAA database, aka "Blind SQL Injection with privileged UAA endpoints."
References
▼ | URL | Tags |
---|---|---|
https://www.cloudfoundry.org/cve-2017-4974/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/99254 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cloud Foundry UAA |
Version: Cloud Foundry UAA |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:47:43.914Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/cve-2017-4974/" }, { "name": "99254", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99254" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Foundry UAA", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cloud Foundry UAA" } ] } ], "datePublic": "2017-06-12T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v258; UAA release 2.x versions prior to v2.7.4.15, 3.6.x versions prior to v3.6.9, 3.9.x versions prior to v3.9.11, and other versions prior to v3.16.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.13, 24.x versions prior to v24.8, and other versions prior to v30.1. An authorized user can use a blind SQL injection attack to query the contents of the UAA database, aka \"Blind SQL Injection with privileged UAA endpoints.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "Blind SQL Injection with privileged UAA endpoints", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-26T09:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/cve-2017-4974/" }, { "name": "99254", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99254" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2017-4974", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Foundry UAA", "version": { "version_data": [ { "version_value": "Cloud Foundry UAA" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v258; UAA release 2.x versions prior to v2.7.4.15, 3.6.x versions prior to v3.6.9, 3.9.x versions prior to v3.9.11, and other versions prior to v3.16.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.13, 24.x versions prior to v24.8, and other versions prior to v30.1. An authorized user can use a blind SQL injection attack to query the contents of the UAA database, aka \"Blind SQL Injection with privileged UAA endpoints.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Blind SQL Injection with privileged UAA endpoints" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cloudfoundry.org/cve-2017-4974/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/cve-2017-4974/" }, { "name": "99254", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99254" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2017-4974", "datePublished": "2017-06-13T06:00:00", "dateReserved": "2016-12-29T00:00:00", "dateUpdated": "2024-08-05T14:47:43.914Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5170
Vulnerability from cvelistv5
Published
2017-10-24 17:00
Modified
2024-08-06 06:41
Severity ?
EPSS score ?
Summary
Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow remote attackers to conduct cross-site request forgery (CSRF) attacks on PWS and log a user into an arbitrary account by leveraging lack of CSRF checks.
References
▼ | URL | Tags |
---|---|---|
https://pivotal.io/security/cve-2015-5170-5173 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/101579 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:41:07.967Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pivotal.io/security/cve-2015-5170-5173" }, { "name": "101579", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101579" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow remote attackers to conduct cross-site request forgery (CSRF) attacks on PWS and log a user into an arbitrary account by leveraging lack of CSRF checks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-27T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pivotal.io/security/cve-2015-5170-5173" }, { "name": "101579", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101579" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5170", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow remote attackers to conduct cross-site request forgery (CSRF) attacks on PWS and log a user into an arbitrary account by leveraging lack of CSRF checks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://pivotal.io/security/cve-2015-5170-5173", "refsource": "CONFIRM", "url": "https://pivotal.io/security/cve-2015-5170-5173" }, { "name": "101579", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101579" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-5170", "datePublished": "2017-10-24T17:00:00", "dateReserved": "2015-07-01T00:00:00", "dateUpdated": "2024-08-06T06:41:07.967Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6655
Vulnerability from cvelistv5
Published
2017-06-13 06:00
Modified
2024-08-06 01:36
Severity ?
EPSS score ?
Summary
An issue was discovered in Cloud Foundry Foundation Cloud Foundry release versions prior to v245 and cf-mysql-release versions prior to v31. A command injection vulnerability was discovered in a common script used by many Cloud Foundry components. A malicious user may exploit numerous vectors to execute arbitrary commands on servers running Cloud Foundry.
References
▼ | URL | Tags |
---|---|---|
https://www.cloudfoundry.org/cve-2016-6655/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/93889 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cloud Foundry |
Version: Cloud Foundry |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:36:29.579Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/cve-2016-6655/" }, { "name": "93889", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93889" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Foundry", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cloud Foundry" } ] } ], "datePublic": "2017-06-12T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation Cloud Foundry release versions prior to v245 and cf-mysql-release versions prior to v31. A command injection vulnerability was discovered in a common script used by many Cloud Foundry components. A malicious user may exploit numerous vectors to execute arbitrary commands on servers running Cloud Foundry." } ], "problemTypes": [ { "descriptions": [ { "description": "command injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-13T09:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/cve-2016-6655/" }, { "name": "93889", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93889" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2016-6655", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Foundry", "version": { "version_data": [ { "version_value": "Cloud Foundry" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Cloud Foundry Foundation Cloud Foundry release versions prior to v245 and cf-mysql-release versions prior to v31. A command injection vulnerability was discovered in a common script used by many Cloud Foundry components. A malicious user may exploit numerous vectors to execute arbitrary commands on servers running Cloud Foundry." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "command injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cloudfoundry.org/cve-2016-6655/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/cve-2016-6655/" }, { "name": "93889", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93889" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2016-6655", "datePublished": "2017-06-13T06:00:00", "dateReserved": "2016-08-10T00:00:00", "dateUpdated": "2024-08-06T01:36:29.579Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-4991
Vulnerability from cvelistv5
Published
2017-06-13 06:00
Modified
2024-08-05 14:47
Severity ?
EPSS score ?
Summary
An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v260; UAA release 2.x versions prior to v2.7.4.16, 3.6.x versions prior to v3.6.10, 3.9.x versions prior to v3.9.12, and other versions prior to v3.17.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.14, 24.x versions prior to v24.9, 30.x versions prior to 30.2, and other versions prior to v36. Privileged users in one zone are allowed to perform a password reset for users in a different zone.
References
▼ | URL | Tags |
---|---|---|
https://www.cloudfoundry.org/cve-2017-4991/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cloud Foundry UAA |
Version: Cloud Foundry UAA |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:47:43.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/cve-2017-4991/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Foundry UAA", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cloud Foundry UAA" } ] } ], "datePublic": "2017-06-12T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v260; UAA release 2.x versions prior to v2.7.4.16, 3.6.x versions prior to v3.6.10, 3.9.x versions prior to v3.9.12, and other versions prior to v3.17.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.14, 24.x versions prior to v24.9, 30.x versions prior to 30.2, and other versions prior to v36. Privileged users in one zone are allowed to perform a password reset for users in a different zone." } ], "problemTypes": [ { "descriptions": [ { "description": "UAA password reset vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-13T05:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/cve-2017-4991/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2017-4991", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Foundry UAA", "version": { "version_data": [ { "version_value": "Cloud Foundry UAA" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v260; UAA release 2.x versions prior to v2.7.4.16, 3.6.x versions prior to v3.6.10, 3.9.x versions prior to v3.9.12, and other versions prior to v3.17.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.14, 24.x versions prior to v24.9, 30.x versions prior to 30.2, and other versions prior to v36. Privileged users in one zone are allowed to perform a password reset for users in a different zone." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UAA password reset vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cloudfoundry.org/cve-2017-4991/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/cve-2017-4991/" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2017-4991", "datePublished": "2017-06-13T06:00:00", "dateReserved": "2016-12-29T00:00:00", "dateUpdated": "2024-08-05T14:47:43.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-8033
Vulnerability from cvelistv5
Published
2017-07-25 04:00
Modified
2024-08-05 16:19
Severity ?
EPSS score ?
Summary
An issue was discovered in the Cloud Controller API in Cloud Foundry Foundation CAPI-release versions prior to v1.35.0 and cf-release versions prior to v268. A filesystem traversal vulnerability exists in the Cloud Controller that allows a space developer to escalate privileges by pushing a specially crafted application that can write arbitrary files to the Cloud Controller VM.
References
▼ | URL | Tags |
---|---|---|
https://www.cloudfoundry.org/cve-2017-8033/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cloud Controller API CAPI-release versions prior to v1.35.0 and cf-release versions prior to v268 |
Version: Cloud Controller API CAPI-release versions prior to v1.35.0 and cf-release versions prior to v268 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:19:29.592Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/cve-2017-8033/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Controller API CAPI-release versions prior to v1.35.0 and cf-release versions prior to v268", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cloud Controller API CAPI-release versions prior to v1.35.0 and cf-release versions prior to v268" } ] } ], "datePublic": "2017-07-24T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Cloud Controller API in Cloud Foundry Foundation CAPI-release versions prior to v1.35.0 and cf-release versions prior to v268. A filesystem traversal vulnerability exists in the Cloud Controller that allows a space developer to escalate privileges by pushing a specially crafted application that can write arbitrary files to the Cloud Controller VM." } ], "problemTypes": [ { "descriptions": [ { "description": "API filesystem traversal vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-25T03:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/cve-2017-8033/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2017-8033", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Controller API CAPI-release versions prior to v1.35.0 and cf-release versions prior to v268", "version": { "version_data": [ { "version_value": "Cloud Controller API CAPI-release versions prior to v1.35.0 and cf-release versions prior to v268" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the Cloud Controller API in Cloud Foundry Foundation CAPI-release versions prior to v1.35.0 and cf-release versions prior to v268. A filesystem traversal vulnerability exists in the Cloud Controller that allows a space developer to escalate privileges by pushing a specially crafted application that can write arbitrary files to the Cloud Controller VM." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "API filesystem traversal vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cloudfoundry.org/cve-2017-8033/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/cve-2017-8033/" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2017-8033", "datePublished": "2017-07-25T04:00:00", "dateReserved": "2017-04-21T00:00:00", "dateUpdated": "2024-08-05T16:19:29.592Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-8219
Vulnerability from cvelistv5
Published
2017-06-13 06:00
Modified
2024-08-06 02:13
Severity ?
EPSS score ?
Summary
An issue was discovered in Cloud Foundry Foundation cf-release versions prior to 250 and CAPI-release versions prior to 1.12.0. A user with the SpaceAuditor role is over-privileged with the ability to restage applications. This could cause application downtime if the restage fails.
References
▼ | URL | Tags |
---|---|---|
https://www.cloudfoundry.org/cve-2016-8219/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cloud Foundry |
Version: Cloud Foundry |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:13:21.853Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/cve-2016-8219/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Foundry", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cloud Foundry" } ] } ], "datePublic": "2017-06-12T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation cf-release versions prior to 250 and CAPI-release versions prior to 1.12.0. A user with the SpaceAuditor role is over-privileged with the ability to restage applications. This could cause application downtime if the restage fails." } ], "problemTypes": [ { "descriptions": [ { "description": "over-privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-13T05:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/cve-2016-8219/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2016-8219", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Foundry", "version": { "version_data": [ { "version_value": "Cloud Foundry" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Cloud Foundry Foundation cf-release versions prior to 250 and CAPI-release versions prior to 1.12.0. A user with the SpaceAuditor role is over-privileged with the ability to restage applications. This could cause application downtime if the restage fails." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "over-privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cloudfoundry.org/cve-2016-8219/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/cve-2016-8219/" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2016-8219", "datePublished": "2017-06-13T06:00:00", "dateReserved": "2016-09-13T00:00:00", "dateUpdated": "2024-08-06T02:13:21.853Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-4970
Vulnerability from cvelistv5
Published
2017-06-13 06:00
Modified
2024-08-05 14:47
Severity ?
EPSS score ?
Summary
An issue was discovered in Cloud Foundry Foundation cf-release v255 and Staticfile buildpack versions v1.4.0 - v1.4.3. A regression introduced in the Static file build pack causes the Staticfile.auth configuration to be ignored when the Static file file is not present in the application root. Applications containing a Staticfile.auth file but not a Static file had their basic auth turned off when an operator upgraded the Static file build pack in the foundation to one of the vulnerable versions. Note that Static file applications without a Static file are technically misconfigured, and will not successfully detect unless the Static file build pack is explicitly specified.
References
▼ | URL | Tags |
---|---|---|
https://www.cloudfoundry.org/cve-2017-4970/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cloud Foundry |
Version: Cloud Foundry |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:47:43.684Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/cve-2017-4970/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Foundry", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cloud Foundry" } ] } ], "datePublic": "2017-06-12T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation cf-release v255 and Staticfile buildpack versions v1.4.0 - v1.4.3. A regression introduced in the Static file build pack causes the Staticfile.auth configuration to be ignored when the Static file file is not present in the application root. Applications containing a Staticfile.auth file but not a Static file had their basic auth turned off when an operator upgraded the Static file build pack in the foundation to one of the vulnerable versions. Note that Static file applications without a Static file are technically misconfigured, and will not successfully detect unless the Static file build pack is explicitly specified." } ], "problemTypes": [ { "descriptions": [ { "description": "Staticfile buildpack ignores basic authentication when misconfigured", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-13T05:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/cve-2017-4970/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2017-4970", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Foundry", "version": { "version_data": [ { "version_value": "Cloud Foundry" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Cloud Foundry Foundation cf-release v255 and Staticfile buildpack versions v1.4.0 - v1.4.3. A regression introduced in the Static file build pack causes the Staticfile.auth configuration to be ignored when the Static file file is not present in the application root. Applications containing a Staticfile.auth file but not a Static file had their basic auth turned off when an operator upgraded the Static file build pack in the foundation to one of the vulnerable versions. Note that Static file applications without a Static file are technically misconfigured, and will not successfully detect unless the Static file build pack is explicitly specified." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Staticfile buildpack ignores basic authentication when misconfigured" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cloudfoundry.org/cve-2017-4970/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/cve-2017-4970/" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2017-4970", "datePublished": "2017-06-13T06:00:00", "dateReserved": "2016-12-29T00:00:00", "dateUpdated": "2024-08-05T14:47:43.684Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-8218
Vulnerability from cvelistv5
Published
2017-06-13 06:00
Modified
2024-08-06 02:13
Severity ?
EPSS score ?
Summary
An issue was discovered in Cloud Foundry Foundation routing-release versions prior to 0.142.0 and cf-release versions 203 to 231. Incomplete validation logic in JSON Web Token (JWT) libraries can allow unprivileged attackers to impersonate other users to the routing API, aka an "Unauthenticated JWT signing algorithm in routing" issue.
References
▼ | URL | Tags |
---|---|---|
https://www.cloudfoundry.org/cve-2016-8218/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cloud Foundry |
Version: Cloud Foundry |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:13:21.828Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/cve-2016-8218/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Foundry", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cloud Foundry" } ] } ], "datePublic": "2017-06-12T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation routing-release versions prior to 0.142.0 and cf-release versions 203 to 231. Incomplete validation logic in JSON Web Token (JWT) libraries can allow unprivileged attackers to impersonate other users to the routing API, aka an \"Unauthenticated JWT signing algorithm in routing\" issue." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthenticated JWT signing algorithm in routing", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-13T05:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/cve-2016-8218/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2016-8218", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Foundry", "version": { "version_data": [ { "version_value": "Cloud Foundry" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Cloud Foundry Foundation routing-release versions prior to 0.142.0 and cf-release versions 203 to 231. Incomplete validation logic in JSON Web Token (JWT) libraries can allow unprivileged attackers to impersonate other users to the routing API, aka an \"Unauthenticated JWT signing algorithm in routing\" issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthenticated JWT signing algorithm in routing" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cloudfoundry.org/cve-2016-8218/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/cve-2016-8218/" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2016-8218", "datePublished": "2017-06-13T06:00:00", "dateReserved": "2016-09-13T00:00:00", "dateUpdated": "2024-08-06T02:13:21.828Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1190
Vulnerability from cvelistv5
Published
2018-01-04 06:00
Modified
2024-08-05 03:51
Severity ?
EPSS score ?
Summary
An issue was discovered in these Pivotal Cloud Foundry products: all versions prior to cf-release v270, UAA v3.x prior to v3.20.2, and UAA bosh v30.x versions prior to v30.8 and all other versions prior to v45.0. A cross-site scripting (XSS) attack is possible in the clientId parameter of a request to the UAA OpenID Connect check session iframe endpoint used for single logout session management.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/102427 | vdb-entry, x_refsource_BID | |
https://www.cloudfoundry.org/cve-2018-1190/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Pivotal Cloud Foundry products: all versions prior to cf-release v270, UAA v3.x prior to v3.20.2, and UAA bosh v30.x versions prior to v30.8 and all other versions prior to v45.0 |
Version: Pivotal Cloud Foundry products: all versions prior to cf-release v270, UAA v3.x prior to v3.20.2, and UAA bosh v30.x versions prior to v30.8 and all other versions prior to v45.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:51:48.920Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "102427", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102427" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/cve-2018-1190/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Pivotal Cloud Foundry products: all versions prior to cf-release v270, UAA v3.x prior to v3.20.2, and UAA bosh v30.x versions prior to v30.8 and all other versions prior to v45.0", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Pivotal Cloud Foundry products: all versions prior to cf-release v270, UAA v3.x prior to v3.20.2, and UAA bosh v30.x versions prior to v30.8 and all other versions prior to v45.0" } ] } ], "datePublic": "2018-01-04T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in these Pivotal Cloud Foundry products: all versions prior to cf-release v270, UAA v3.x prior to v3.20.2, and UAA bosh v30.x versions prior to v30.8 and all other versions prior to v45.0. A cross-site scripting (XSS) attack is possible in the clientId parameter of a request to the UAA OpenID Connect check session iframe endpoint used for single logout session management." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site Scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-06T10:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "name": "102427", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102427" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/cve-2018-1190/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2018-1190", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Pivotal Cloud Foundry products: all versions prior to cf-release v270, UAA v3.x prior to v3.20.2, and UAA bosh v30.x versions prior to v30.8 and all other versions prior to v45.0", "version": { "version_data": [ { "version_value": "Pivotal Cloud Foundry products: all versions prior to cf-release v270, UAA v3.x prior to v3.20.2, and UAA bosh v30.x versions prior to v30.8 and all other versions prior to v45.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in these Pivotal Cloud Foundry products: all versions prior to cf-release v270, UAA v3.x prior to v3.20.2, and UAA bosh v30.x versions prior to v30.8 and all other versions prior to v45.0. A cross-site scripting (XSS) attack is possible in the clientId parameter of a request to the UAA OpenID Connect check session iframe endpoint used for single logout session management." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site Scripting" } ] } ] }, "references": { "reference_data": [ { "name": "102427", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102427" }, { "name": "https://www.cloudfoundry.org/cve-2018-1190/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/cve-2018-1190/" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2018-1190", "datePublished": "2018-01-04T06:00:00", "dateReserved": "2017-12-06T00:00:00", "dateUpdated": "2024-08-05T03:51:48.920Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-0780
Vulnerability from cvelistv5
Published
2017-05-25 17:00
Modified
2024-08-05 22:30
Severity ?
EPSS score ?
Summary
It was discovered that cf-release v231 and lower, Pivotal Cloud Foundry Elastic Runtime 1.5.x versions prior to 1.5.17 and Pivotal Cloud Foundry Elastic Runtime 1.6.x versions prior to 1.6.18 do not properly enforce disk quotas in certain cases. An attacker could use an improper disk quota value to bypass enforcement and consume all the disk on DEAs/CELLs causing a potential denial of service for other applications.
References
▼ | URL | Tags |
---|---|---|
https://pivotal.io/security/cve-2016-0780 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Pivotal | Cloud Foundry |
Version: cf-release v231 and lower Version: Elastic Runtime 1.5.x versions prior to 1.5.17 Version: Elastic Runtime 1.6.x versions prior to 1.6.18 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:30:04.090Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pivotal.io/security/cve-2016-0780" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Foundry", "vendor": "Pivotal", "versions": [ { "status": "affected", "version": "cf-release v231 and lower" }, { "status": "affected", "version": "Elastic Runtime 1.5.x versions prior to 1.5.17" }, { "status": "affected", "version": "Elastic Runtime 1.6.x versions prior to 1.6.18" } ] } ], "datePublic": "2016-03-23T00:00:00", "descriptions": [ { "lang": "en", "value": "It was discovered that cf-release v231 and lower, Pivotal Cloud Foundry Elastic Runtime 1.5.x versions prior to 1.5.17 and Pivotal Cloud Foundry Elastic Runtime 1.6.x versions prior to 1.6.18 do not properly enforce disk quotas in certain cases. An attacker could use an improper disk quota value to bypass enforcement and consume all the disk on DEAs/CELLs causing a potential denial of service for other applications." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-05-25T16:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pivotal.io/security/cve-2016-0780" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2016-0780", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Foundry", "version": { "version_data": [ { "version_value": "cf-release v231 and lower" }, { "version_value": "Elastic Runtime 1.5.x versions prior to 1.5.17" }, { "version_value": "Elastic Runtime 1.6.x versions prior to 1.6.18" } ] } } ] }, "vendor_name": "Pivotal" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "It was discovered that cf-release v231 and lower, Pivotal Cloud Foundry Elastic Runtime 1.5.x versions prior to 1.5.17 and Pivotal Cloud Foundry Elastic Runtime 1.6.x versions prior to 1.6.18 do not properly enforce disk quotas in certain cases. An attacker could use an improper disk quota value to bypass enforcement and consume all the disk on DEAs/CELLs causing a potential denial of service for other applications." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://pivotal.io/security/cve-2016-0780", "refsource": "CONFIRM", "url": "https://pivotal.io/security/cve-2016-0780" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2016-0780", "datePublished": "2017-05-25T17:00:00", "dateReserved": "2015-12-16T00:00:00", "dateUpdated": "2024-08-05T22:30:04.090Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-8034
Vulnerability from cvelistv5
Published
2017-07-17 14:00
Modified
2024-08-05 16:19
Severity ?
EPSS score ?
Summary
The Cloud Controller and Router in Cloud Foundry (CAPI-release capi versions prior to v1.32.0, Routing-release versions prior to v0.159.0, CF-release versions prior to v267) do not validate the issuer on JSON Web Tokens (JWTs) from UAA. With certain multi-zone UAA configurations, zone administrators are able to escalate their privileges.
References
▼ | URL | Tags |
---|---|---|
https://www.cloudfoundry.org/cve-2017-8034/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cloud Foundry |
Version: Cloud Foundry |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:19:29.540Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/cve-2017-8034/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Foundry", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cloud Foundry" } ] } ], "datePublic": "2017-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The Cloud Controller and Router in Cloud Foundry (CAPI-release capi versions prior to v1.32.0, Routing-release versions prior to v0.159.0, CF-release versions prior to v267) do not validate the issuer on JSON Web Tokens (JWTs) from UAA. With certain multi-zone UAA configurations, zone administrators are able to escalate their privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-17T13:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/cve-2017-8034/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2017-8034", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Foundry", "version": { "version_data": [ { "version_value": "Cloud Foundry" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Cloud Controller and Router in Cloud Foundry (CAPI-release capi versions prior to v1.32.0, Routing-release versions prior to v0.159.0, CF-release versions prior to v267) do not validate the issuer on JSON Web Tokens (JWTs) from UAA. With certain multi-zone UAA configurations, zone administrators are able to escalate their privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cloudfoundry.org/cve-2017-8034/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/cve-2017-8034/" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2017-8034", "datePublished": "2017-07-17T14:00:00", "dateReserved": "2017-04-21T00:00:00", "dateUpdated": "2024-08-05T16:19:29.540Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-4992
Vulnerability from cvelistv5
Published
2017-06-13 06:00
Modified
2024-08-05 14:47
Severity ?
EPSS score ?
Summary
An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v261; UAA release 2.x versions prior to v2.7.4.17, 3.6.x versions prior to v3.6.11, 3.9.x versions prior to v3.9.13, and other versions prior to v4.2.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.15, 24.x versions prior to v24.10, 30.x versions prior to 30.3, and other versions prior to v37. There is privilege escalation (arbitrary password reset) with user invitations.
References
▼ | URL | Tags |
---|---|---|
https://www.cloudfoundry.org/cve-2017-4992/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cloud Foundry |
Version: Cloud Foundry |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:47:43.659Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/cve-2017-4992/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Foundry", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cloud Foundry" } ] } ], "datePublic": "2017-06-12T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v261; UAA release 2.x versions prior to v2.7.4.17, 3.6.x versions prior to v3.6.11, 3.9.x versions prior to v3.9.13, and other versions prior to v4.2.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.15, 24.x versions prior to v24.10, 30.x versions prior to 30.3, and other versions prior to v37. There is privilege escalation (arbitrary password reset) with user invitations." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege escalation with user invitations", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-13T05:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/cve-2017-4992/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2017-4992", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Foundry", "version": { "version_data": [ { "version_value": "Cloud Foundry" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v261; UAA release 2.x versions prior to v2.7.4.17, 3.6.x versions prior to v3.6.11, 3.9.x versions prior to v3.9.13, and other versions prior to v4.2.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.15, 24.x versions prior to v24.10, 30.x versions prior to 30.3, and other versions prior to v37. There is privilege escalation (arbitrary password reset) with user invitations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege escalation with user invitations" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cloudfoundry.org/cve-2017-4992/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/cve-2017-4992/" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2017-4992", "datePublished": "2017-06-13T06:00:00", "dateReserved": "2016-12-29T00:00:00", "dateUpdated": "2024-08-05T14:47:43.659Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-8037
Vulnerability from cvelistv5
Published
2017-08-21 22:00
Modified
2024-08-05 16:19
Severity ?
EPSS score ?
Summary
In Cloud Foundry Foundation CAPI-release versions after v1.6.0 and prior to v1.38.0 and cf-release versions after v244 and prior to v270, there is an incomplete fix for CVE-2017-8035. If you took steps to remediate CVE-2017-8035 you should also upgrade to fix this CVE. A carefully crafted CAPI request from a Space Developer can allow them to gain access to files on the Cloud Controller VM for that installation, aka an Information Leak / Disclosure.
References
▼ | URL | Tags |
---|---|---|
https://www.cloudfoundry.org/cve-2017-8037/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/100448 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cloud Foundry |
Version: Cloud Foundry |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:19:29.884Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/cve-2017-8037/" }, { "name": "100448", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100448" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Foundry", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cloud Foundry" } ] } ], "datePublic": "2017-08-21T00:00:00", "descriptions": [ { "lang": "en", "value": "In Cloud Foundry Foundation CAPI-release versions after v1.6.0 and prior to v1.38.0 and cf-release versions after v244 and prior to v270, there is an incomplete fix for CVE-2017-8035. If you took steps to remediate CVE-2017-8035 you should also upgrade to fix this CVE. A carefully crafted CAPI request from a Space Developer can allow them to gain access to files on the Cloud Controller VM for that installation, aka an Information Leak / Disclosure." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Leak / Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-22T08:06:05", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/cve-2017-8037/" }, { "name": "100448", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100448" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2017-8037", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Foundry", "version": { "version_data": [ { "version_value": "Cloud Foundry" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Cloud Foundry Foundation CAPI-release versions after v1.6.0 and prior to v1.38.0 and cf-release versions after v244 and prior to v270, there is an incomplete fix for CVE-2017-8035. If you took steps to remediate CVE-2017-8035 you should also upgrade to fix this CVE. A carefully crafted CAPI request from a Space Developer can allow them to gain access to files on the Cloud Controller VM for that installation, aka an Information Leak / Disclosure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Leak / Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cloudfoundry.org/cve-2017-8037/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/cve-2017-8037/" }, { "name": "100448", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100448" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2017-8037", "datePublished": "2017-08-21T22:00:00", "dateReserved": "2017-04-21T00:00:00", "dateUpdated": "2024-08-05T16:19:29.884Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6658
Vulnerability from cvelistv5
Published
2018-03-29 22:00
Modified
2024-08-06 01:36
Severity ?
EPSS score ?
Summary
Applications in cf-release before 245 can be configured and pushed with a user-provided custom buildpack using a URL pointing to the buildpack. Although it is not recommended, a user can specify a credential in the URL (basic auth or OAuth) to access the buildpack through the CLI. For example, the user could include a GitHub username and password in the URL to access a private repo. Because the URL to access the buildpack is stored unencrypted, an operator with privileged access to the Cloud Controller database could view these credentials.
References
▼ | URL | Tags |
---|---|---|
https://pivotal.io/security/cve-2016-6658 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:36:29.571Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pivotal.io/security/cve-2016-6658" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-08-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Applications in cf-release before 245 can be configured and pushed with a user-provided custom buildpack using a URL pointing to the buildpack. Although it is not recommended, a user can specify a credential in the URL (basic auth or OAuth) to access the buildpack through the CLI. For example, the user could include a GitHub username and password in the URL to access a private repo. Because the URL to access the buildpack is stored unencrypted, an operator with privileged access to the Cloud Controller database could view these credentials." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-29T21:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pivotal.io/security/cve-2016-6658" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2016-6658", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Applications in cf-release before 245 can be configured and pushed with a user-provided custom buildpack using a URL pointing to the buildpack. Although it is not recommended, a user can specify a credential in the URL (basic auth or OAuth) to access the buildpack through the CLI. For example, the user could include a GitHub username and password in the URL to access a private repo. Because the URL to access the buildpack is stored unencrypted, an operator with privileged access to the Cloud Controller database could view these credentials." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://pivotal.io/security/cve-2016-6658", "refsource": "CONFIRM", "url": "https://pivotal.io/security/cve-2016-6658" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2016-6658", "datePublished": "2018-03-29T22:00:00", "dateReserved": "2016-08-10T00:00:00", "dateUpdated": "2024-08-06T01:36:29.571Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-3190
Vulnerability from cvelistv5
Published
2017-05-25 17:00
Modified
2024-08-06 05:39
Severity ?
EPSS score ?
Summary
With Cloud Foundry Runtime cf-release versions v209 or earlier, UAA Standalone versions 2.2.6 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier the UAA logout link is susceptible to an open redirect which allows an attacker to insert malicious web page as a redirect parameter.
References
▼ | URL | Tags |
---|---|---|
https://pivotal.io/security/cve-2015-3190 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Pivotal | Cloud Foundry |
Version: Runtime cf-release versions v209 or earlier Version: UAA Standalone versions 2.2.6 or earlier Version: Runtime 1.4.5 or earlier |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:39:31.774Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pivotal.io/security/cve-2015-3190" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Foundry", "vendor": "Pivotal", "versions": [ { "status": "affected", "version": "Runtime cf-release versions v209 or earlier" }, { "status": "affected", "version": "UAA Standalone versions 2.2.6 or earlier" }, { "status": "affected", "version": "Runtime 1.4.5 or earlier" } ] } ], "datePublic": "2015-06-25T00:00:00", "descriptions": [ { "lang": "en", "value": "With Cloud Foundry Runtime cf-release versions v209 or earlier, UAA Standalone versions 2.2.6 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier the UAA logout link is susceptible to an open redirect which allows an attacker to insert malicious web page as a redirect parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "Open redirect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-05-25T16:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pivotal.io/security/cve-2015-3190" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2015-3190", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Foundry", "version": { "version_data": [ { "version_value": "Runtime cf-release versions v209 or earlier" }, { "version_value": "UAA Standalone versions 2.2.6 or earlier" }, { "version_value": "Runtime 1.4.5 or earlier" } ] } } ] }, "vendor_name": "Pivotal" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "With Cloud Foundry Runtime cf-release versions v209 or earlier, UAA Standalone versions 2.2.6 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier the UAA logout link is susceptible to an open redirect which allows an attacker to insert malicious web page as a redirect parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Open redirect" } ] } ] }, "references": { "reference_data": [ { "name": "https://pivotal.io/security/cve-2015-3190", "refsource": "CONFIRM", "url": "https://pivotal.io/security/cve-2015-3190" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2015-3190", "datePublished": "2017-05-25T17:00:00", "dateReserved": "2015-04-10T00:00:00", "dateUpdated": "2024-08-06T05:39:31.774Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-8031
Vulnerability from cvelistv5
Published
2017-11-27 10:00
Modified
2024-08-05 16:19
Severity ?
EPSS score ?
Summary
An issue was discovered in Cloud Foundry Foundation cf-release (all versions prior to v279) and UAA (30.x versions prior to 30.6, 45.x versions prior to 45.4, 52.x versions prior to 52.1). In some cases, the UAA allows an authenticated user for a particular client to revoke client tokens for other users on the same client. This occurs only if the client is using opaque tokens or JWT tokens validated using the check_token endpoint. A malicious actor could cause denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.cloudfoundry.org/cve-2017-8031/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/101967 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | cf-release and UAA cf-release: All versions prior to v279, UAA: 30.x versions prior to 30.6, 45.x versions prior to 45.4, 52.x versions prior to 52.1 |
Version: cf-release and UAA cf-release: All versions prior to v279, UAA: 30.x versions prior to 30.6, 45.x versions prior to 45.4, 52.x versions prior to 52.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:19:29.544Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/cve-2017-8031/" }, { "name": "101967", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101967" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "cf-release and UAA cf-release: All versions prior to v279, UAA: 30.x versions prior to 30.6, 45.x versions prior to 45.4, 52.x versions prior to 52.1", "vendor": "n/a", "versions": [ { "status": "affected", "version": "cf-release and UAA cf-release: All versions prior to v279, UAA: 30.x versions prior to 30.6, 45.x versions prior to 45.4, 52.x versions prior to 52.1" } ] } ], "datePublic": "2017-11-27T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation cf-release (all versions prior to v279) and UAA (30.x versions prior to 30.6, 45.x versions prior to 45.4, 52.x versions prior to 52.1). In some cases, the UAA allows an authenticated user for a particular client to revoke client tokens for other users on the same client. This occurs only if the client is using opaque tokens or JWT tokens validated using the check_token endpoint. A malicious actor could cause denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-29T10:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/cve-2017-8031/" }, { "name": "101967", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101967" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2017-8031", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "cf-release and UAA cf-release: All versions prior to v279, UAA: 30.x versions prior to 30.6, 45.x versions prior to 45.4, 52.x versions prior to 52.1", "version": { "version_data": [ { "version_value": "cf-release and UAA cf-release: All versions prior to v279, UAA: 30.x versions prior to 30.6, 45.x versions prior to 45.4, 52.x versions prior to 52.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Cloud Foundry Foundation cf-release (all versions prior to v279) and UAA (30.x versions prior to 30.6, 45.x versions prior to 45.4, 52.x versions prior to 52.1). In some cases, the UAA allows an authenticated user for a particular client to revoke client tokens for other users on the same client. This occurs only if the client is using opaque tokens or JWT tokens validated using the check_token endpoint. A malicious actor could cause denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cloudfoundry.org/cve-2017-8031/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/cve-2017-8031/" }, { "name": "101967", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101967" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2017-8031", "datePublished": "2017-11-27T10:00:00", "dateReserved": "2017-04-21T00:00:00", "dateUpdated": "2024-08-05T16:19:29.544Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-4972
Vulnerability from cvelistv5
Published
2017-06-13 06:00
Modified
2024-08-05 14:47
Severity ?
EPSS score ?
Summary
An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v257; UAA release 2.x versions prior to v2.7.4.14, 3.6.x versions prior to v3.6.8, 3.9.x versions prior to v3.9.10, and other versions prior to v3.15.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.12, 24.x versions prior to v24.7, and other versions prior to v30. An attacker can use a blind SQL injection attack to query the contents of the UAA database.
References
▼ | URL | Tags |
---|---|---|
https://www.cloudfoundry.org/cve-2017-4972/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cloud Foundry UAA |
Version: Cloud Foundry UAA |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:47:43.936Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/cve-2017-4972/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Foundry UAA", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cloud Foundry UAA" } ] } ], "datePublic": "2017-06-12T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v257; UAA release 2.x versions prior to v2.7.4.14, 3.6.x versions prior to v3.6.8, 3.9.x versions prior to v3.9.10, and other versions prior to v3.15.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.12, 24.x versions prior to v24.7, and other versions prior to v30. An attacker can use a blind SQL injection attack to query the contents of the UAA database." } ], "problemTypes": [ { "descriptions": [ { "description": "Blind SQL Injection in UAA", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-13T05:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/cve-2017-4972/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2017-4972", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Foundry UAA", "version": { "version_data": [ { "version_value": "Cloud Foundry UAA" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v257; UAA release 2.x versions prior to v2.7.4.14, 3.6.x versions prior to v3.6.8, 3.9.x versions prior to v3.9.10, and other versions prior to v3.15.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.12, 24.x versions prior to v24.7, and other versions prior to v30. An attacker can use a blind SQL injection attack to query the contents of the UAA database." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Blind SQL Injection in UAA" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cloudfoundry.org/cve-2017-4972/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/cve-2017-4972/" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2017-4972", "datePublished": "2017-06-13T06:00:00", "dateReserved": "2016-12-29T00:00:00", "dateUpdated": "2024-08-05T14:47:43.936Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5172
Vulnerability from cvelistv5
Published
2017-10-24 17:00
Modified
2024-08-06 06:41
Severity ?
EPSS score ?
Summary
Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire password reset links.
References
▼ | URL | Tags |
---|---|---|
https://pivotal.io/security/cve-2015-5170-5173 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:41:09.222Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pivotal.io/security/cve-2015-5170-5173" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire password reset links." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-24T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pivotal.io/security/cve-2015-5170-5173" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5172", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire password reset links." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://pivotal.io/security/cve-2015-5170-5173", "refsource": "CONFIRM", "url": "https://pivotal.io/security/cve-2015-5170-5173" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-5172", "datePublished": "2017-10-24T17:00:00", "dateReserved": "2015-07-01T00:00:00", "dateUpdated": "2024-08-06T06:41:09.222Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-2169
Vulnerability from cvelistv5
Published
2018-04-18 16:00
Modified
2024-09-16 18:44
Severity ?
EPSS score ?
Summary
Cloud Foundry Cloud Controller, capi-release versions prior to 1.0.0 and cf-release versions prior to v237, contain a business logic flaw. An application developer may create an application with a route that conflicts with a platform service route and receive traffic intended for the service.
References
▼ | URL | Tags |
---|---|---|
https://github.com/cloudfoundry/cloud_controller_ng/issues/568 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cloud Foundry | Cloud Controller |
Version: capi-release prior to 1.0.0, cf-release prior to v237 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:17:50.784Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/cloudfoundry/cloud_controller_ng/issues/568" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Controller", "vendor": "Cloud Foundry", "versions": [ { "status": "affected", "version": "capi-release prior to 1.0.0, cf-release prior to v237" } ] } ], "datePublic": "2016-03-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Cloud Foundry Cloud Controller, capi-release versions prior to 1.0.0 and cf-release versions prior to v237, contain a business logic flaw. An application developer may create an application with a route that conflicts with a platform service route and receive traffic intended for the service." } ], "problemTypes": [ { "descriptions": [ { "description": "Business logic", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-18T15:57:02", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/cloudfoundry/cloud_controller_ng/issues/568" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "DATE_PUBLIC": "2016-03-23T00:00:00", "ID": "CVE-2016-2169", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Controller", "version": { "version_data": [ { "version_value": "capi-release prior to 1.0.0, cf-release prior to v237" } ] } } ] }, "vendor_name": "Cloud Foundry" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cloud Foundry Cloud Controller, capi-release versions prior to 1.0.0 and cf-release versions prior to v237, contain a business logic flaw. An application developer may create an application with a route that conflicts with a platform service route and receive traffic intended for the service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Business logic" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/cloudfoundry/cloud_controller_ng/issues/568", "refsource": "CONFIRM", "url": "https://github.com/cloudfoundry/cloud_controller_ng/issues/568" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2016-2169", "datePublished": "2018-04-18T16:00:00Z", "dateReserved": "2016-01-29T00:00:00", "dateUpdated": "2024-09-16T18:44:03.609Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-14389
Vulnerability from cvelistv5
Published
2017-11-28 07:00
Modified
2024-08-05 19:27
Severity ?
EPSS score ?
Summary
An issue was discovered in Cloud Foundry Foundation capi-release (all versions prior to 1.45.0), cf-release (all versions prior to v280), and cf-deployment (all versions prior to v1.0.0). The Cloud Controller does not prevent space developers from creating subdomains to an already existing route that belongs to a different user in a different org and space, aka an "Application Subdomain Takeover."
References
▼ | URL | Tags |
---|---|---|
https://www.cloudfoundry.org/cve-2017-14389/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cloud Foundry capi-release: All versions prior to 1.45.0, cf-release: All versions prior to v280, cf-deployment: All versions prior to v1.0.0 |
Version: Cloud Foundry capi-release: All versions prior to 1.45.0, cf-release: All versions prior to v280, cf-deployment: All versions prior to v1.0.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:27:40.603Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/cve-2017-14389/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Foundry capi-release: All versions prior to 1.45.0, cf-release: All versions prior to v280, cf-deployment: All versions prior to v1.0.0", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cloud Foundry capi-release: All versions prior to 1.45.0, cf-release: All versions prior to v280, cf-deployment: All versions prior to v1.0.0" } ] } ], "datePublic": "2017-11-28T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Cloud Foundry Foundation capi-release (all versions prior to 1.45.0), cf-release (all versions prior to v280), and cf-deployment (all versions prior to v1.0.0). The Cloud Controller does not prevent space developers from creating subdomains to an already existing route that belongs to a different user in a different org and space, aka an \"Application Subdomain Takeover.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "Application Subdomain Takeover", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-28T06:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/cve-2017-14389/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2017-14389", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Foundry capi-release: All versions prior to 1.45.0, cf-release: All versions prior to v280, cf-deployment: All versions prior to v1.0.0", "version": { "version_data": [ { "version_value": "Cloud Foundry capi-release: All versions prior to 1.45.0, cf-release: All versions prior to v280, cf-deployment: All versions prior to v1.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Cloud Foundry Foundation capi-release (all versions prior to 1.45.0), cf-release (all versions prior to v280), and cf-deployment (all versions prior to v1.0.0). The Cloud Controller does not prevent space developers from creating subdomains to an already existing route that belongs to a different user in a different org and space, aka an \"Application Subdomain Takeover.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Application Subdomain Takeover" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cloudfoundry.org/cve-2017-14389/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/cve-2017-14389/" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2017-14389", "datePublished": "2017-11-28T07:00:00", "dateReserved": "2017-09-12T00:00:00", "dateUpdated": "2024-08-05T19:27:40.603Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5171
Vulnerability from cvelistv5
Published
2017-10-24 17:00
Modified
2024-08-06 06:41
Severity ?
EPSS score ?
Summary
The password change functionality in Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire existing sessions.
References
▼ | URL | Tags |
---|---|---|
https://pivotal.io/security/cve-2015-5170-5173 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:41:07.973Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pivotal.io/security/cve-2015-5170-5173" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The password change functionality in Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire existing sessions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-24T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pivotal.io/security/cve-2015-5170-5173" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5171", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The password change functionality in Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire existing sessions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://pivotal.io/security/cve-2015-5170-5173", "refsource": "CONFIRM", "url": "https://pivotal.io/security/cve-2015-5170-5173" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-5171", "datePublished": "2017-10-24T17:00:00", "dateReserved": "2015-07-01T00:00:00", "dateUpdated": "2024-08-06T06:41:07.973Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-0708
Vulnerability from cvelistv5
Published
2018-07-11 20:00
Modified
2024-08-05 22:30
Severity ?
EPSS score ?
Summary
Applications deployed to Cloud Foundry, versions v166 through v227, may be vulnerable to a remote disclosure of information, including, but not limited to environment variables and bound service details. For applications to be vulnerable, they must have been staged using automatic buildpack detection, passed through the Java Buildpack detection script, and allow the serving of static content from within the deployed artifact. The default Apache Tomcat configuration in the affected java buildpack versions for some basic web application archive (WAR) packaged applications are vulnerable to this issue.
References
▼ | URL | Tags |
---|---|---|
https://www.cloudfoundry.org/blog/cve-2016-0708/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cloud Foundry | Cloud Foundry |
Version: versions v166 through v227 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:30:03.631Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/blog/cve-2016-0708/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Foundry", "vendor": "Cloud Foundry", "versions": [ { "status": "affected", "version": "versions v166 through v227" } ] } ], "datePublic": "2016-01-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Applications deployed to Cloud Foundry, versions v166 through v227, may be vulnerable to a remote disclosure of information, including, but not limited to environment variables and bound service details. For applications to be vulnerable, they must have been staged using automatic buildpack detection, passed through the Java Buildpack detection script, and allow the serving of static content from within the deployed artifact. The default Apache Tomcat configuration in the affected java buildpack versions for some basic web application archive (WAR) packaged applications are vulnerable to this issue." } ], "problemTypes": [ { "descriptions": [ { "description": "Information disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-11T19:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/blog/cve-2016-0708/" } ], "source": { "discovery": "UNKNOWN" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2016-0708", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Foundry", "version": { "version_data": [ { "version_value": "versions v166 through v227" } ] } } ] }, "vendor_name": "Cloud Foundry" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Applications deployed to Cloud Foundry, versions v166 through v227, may be vulnerable to a remote disclosure of information, including, but not limited to environment variables and bound service details. For applications to be vulnerable, they must have been staged using automatic buildpack detection, passed through the Java Buildpack detection script, and allow the serving of static content from within the deployed artifact. The default Apache Tomcat configuration in the affected java buildpack versions for some basic web application archive (WAR) packaged applications are vulnerable to this issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cloudfoundry.org/blog/cve-2016-0708/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/blog/cve-2016-0708/" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2016-0708", "datePublished": "2018-07-11T20:00:00", "dateReserved": "2015-12-16T00:00:00", "dateUpdated": "2024-08-05T22:30:03.631Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }