Show filters
38 Total Results
Displaying 21-30 of 38
Sort by:
Attacker Value
Unknown

UAA logs all query parameters with debug logging level

Disclosure Date: December 06, 2019 (last updated November 27, 2024)
Cloud Foundry UAA Release, versions prior to v74.10.0, when set to logging level DEBUG, logs client_secret credentials when sent as a query parameter. A remote authenticated malicious user could gain access to user credentials via the uaa.log file if authentication is provided via query parameters.
Attacker Value
Unknown

Cloud Foundry UAA logs query parameters in tomcat access file

Disclosure Date: November 26, 2019 (last updated November 08, 2023)
Cloud Foundry UAA Release, versions prior to v74.8.0, logs all query parameters to tomcat’s access file. If the query parameters are used to provide authentication, ie. credentials, then they will be logged as well.
Attacker Value
Unknown

A forged route service request using an invalid nonce can cause the gorouter to…

Disclosure Date: November 19, 2019 (last updated November 27, 2024)
Cloud Foundry Routing, all versions before 0.193.0, does not properly validate nonce input. A remote unauthenticated malicious user could forge an HTTP route service request using an invalid nonce that will cause the Gorouter to crash.
Attacker Value
Unknown

UAA is vulnerable to a Blind SCIM injection leading to information disclosure

Disclosure Date: October 23, 2019 (last updated November 27, 2024)
Cloud Foundry UAA, versions prior to v74.3.0, contains an endpoint that is vulnerable to SCIM injection attack. A remote authenticated malicious user with scim.invite scope can craft a request with malicious content which can leak information about users of the UAA.
Attacker Value
Unknown

Password leak in smbdriver logs

Disclosure Date: October 23, 2019 (last updated November 27, 2024)
Cloud Foundry SMB Volume, versions prior to v2.0.3, accidentally outputs sensitive information to the logs. A remote user with access to the SMB Volume logs can discover the username and password for volumes that have been recently created, allowing the user to take control of the SMB Volume.
Attacker Value
Unknown

Volume Services is vulnerable to an LDAP injection attack

Disclosure Date: September 23, 2019 (last updated November 27, 2024)
Cloud Foundry NFS Volume Service, 1.7.x versions prior to 1.7.11 and 2.x versions prior to 2.3.0, is vulnerable to LDAP injection. A remote authenticated malicious space developer can potentially inject LDAP filters via service instance creation, facilitating the malicious space developer to deny service or perform a dictionary attack.
Attacker Value
Unknown

CF CLI writes the client id and secret to config file

Disclosure Date: August 05, 2019 (last updated November 27, 2024)
CF CLI version prior to v6.45.0 (bosh release version 1.16.0) writes the client id and secret to its config file when the user authenticates with --client-credentials flag. A local authenticated malicious user with access to the CF CLI config file can act as that client, who is the owner of the leaked credentials.
0
Attacker Value
Unknown

Java Projects using HTTP to fetch dependencies

Disclosure Date: April 25, 2019 (last updated November 27, 2024)
Cloud Foundry cf-deployment, versions prior to 7.9.0, contain java components that are using an insecure protocol to fetch dependencies when building. A remote unauthenticated malicious attacker could hijack the DNS entry for the dependency, and inject malicious code into the component.
Attacker Value
Unknown

CVE-2018-1265

Disclosure Date: June 06, 2018 (last updated November 26, 2024)
Cloud Foundry Diego, release versions prior to 2.8.0, does not properly sanitize file paths in tar and zip files headers. A remote attacker with CF admin privileges can upload a malicious buildpack that will allow a complete takeover of a Diego Cell VM and access to all apps running on that Diego Cell.
0
Attacker Value
Unknown

CVE-2018-1193

Disclosure Date: May 23, 2018 (last updated November 26, 2024)
Cloud Foundry routing-release, versions prior to 0.175.0, lacks sanitization for user-provided X-Forwarded-Proto headers. A remote user can set the X-Forwarded-Proto header in a request to potentially bypass an application requirement to only respond over secure connections.
0