Show filters
23 Total Results
Displaying 11-20 of 23
Sort by:
Attacker Value
Unknown
Cloud Controller provides signed URL with write authorization to read only user
Disclosure Date: March 13, 2019 (last updated November 27, 2024)
Cloud Foundry Cloud Controller, versions prior to 1.78.0, contain an endpoint with improper authorization. A remote authenticated malicious user with read permissions can request package information and receive a signed bit-service url that grants the user write permissions to the bit-service.
0
Attacker Value
Unknown
CVE-2016-2169
Disclosure Date: April 18, 2018 (last updated November 26, 2024)
Cloud Foundry Cloud Controller, capi-release versions prior to 1.0.0 and cf-release versions prior to v237, contain a business logic flaw. An application developer may create an application with a route that conflicts with a platform service route and receive traffic intended for the service.
0
Attacker Value
Unknown
CVE-2018-1266
Disclosure Date: March 27, 2018 (last updated November 26, 2024)
Cloud Foundry Cloud Controller, versions prior to 1.52.0, contains information disclosure and path traversal vulnerabilities. An authenticated malicious user can predict the location of application blobs and leverage path traversal to create a malicious application that has the ability to overwrite arbitrary files on the Cloud Controller instance.
0
Attacker Value
Unknown
CVE-2018-1195
Disclosure Date: March 19, 2018 (last updated November 26, 2024)
In Cloud Controller versions prior to 1.46.0, cf-deployment versions prior to 1.3.0, and cf-release versions prior to 283, Cloud Controller accepts refresh tokens for authentication where access tokens are expected. This exposes a vulnerability where a refresh token that would otherwise be insufficient to obtain an access token, either due to lack of client credentials or revocation, would allow authentication.
0
Attacker Value
Unknown
CVE-2017-14389
Disclosure Date: November 28, 2017 (last updated November 26, 2024)
An issue was discovered in Cloud Foundry Foundation capi-release (all versions prior to 1.45.0), cf-release (all versions prior to v280), and cf-deployment (all versions prior to v1.0.0). The Cloud Controller does not prevent space developers from creating subdomains to an already existing route that belongs to a different user in a different org and space, aka an "Application Subdomain Takeover."
0
Attacker Value
Unknown
CVE-2017-8048
Disclosure Date: October 04, 2017 (last updated November 26, 2024)
In Cloud Foundry capi-release versions 1.33.0 and later, prior to 1.42.0 and cf-release versions 268 and later, prior to 274, the original fix for CVE-2017-8033 introduces an API regression that allows a space developer to execute arbitrary code on the Cloud Controller VM by pushing a specially crafted application. NOTE: 274 resolves the vulnerability but has a serious bug that is fixed in 275.
0
Attacker Value
Unknown
CVE-2017-8037
Disclosure Date: August 21, 2017 (last updated November 26, 2024)
In Cloud Foundry Foundation CAPI-release versions after v1.6.0 and prior to v1.38.0 and cf-release versions after v244 and prior to v270, there is an incomplete fix for CVE-2017-8035. If you took steps to remediate CVE-2017-8035 you should also upgrade to fix this CVE. A carefully crafted CAPI request from a Space Developer can allow them to gain access to files on the Cloud Controller VM for that installation, aka an Information Leak / Disclosure.
0
Attacker Value
Unknown
CVE-2017-8033
Disclosure Date: July 25, 2017 (last updated November 26, 2024)
An issue was discovered in the Cloud Controller API in Cloud Foundry Foundation CAPI-release versions prior to v1.35.0 and cf-release versions prior to v268. A filesystem traversal vulnerability exists in the Cloud Controller that allows a space developer to escalate privileges by pushing a specially crafted application that can write arbitrary files to the Cloud Controller VM.
0
Attacker Value
Unknown
CVE-2017-8035
Disclosure Date: July 25, 2017 (last updated November 26, 2024)
An issue was discovered in the Cloud Controller API in Cloud Foundry Foundation CAPI-release versions after v1.6.0 and prior to v1.35.0 and cf-release versions after v244 and prior to v268. A carefully crafted CAPI request from a Space Developer can allow them to gain access to files on the Cloud Controller VM for that installation.
0
Attacker Value
Unknown
CVE-2017-8036
Disclosure Date: July 24, 2017 (last updated November 26, 2024)
An issue was discovered in the Cloud Controller API in Cloud Foundry Foundation CAPI-release version 1.33.0 (only). The original fix for CVE-2017-8033 included in CAPI-release 1.33.0 introduces a regression that allows a space developer to execute arbitrary code on the Cloud Controller VM by pushing a specially crafted application.
0