Show filters
144 Total Results
Displaying 21-30 of 144
Sort by:
Attacker Value
Unknown

Pivotal Ops Manager logs query parameters in tomcat access file

Disclosure Date: July 15, 2019 (last updated February 21, 2025)
Pivotal Ops Manager, versions 2.4.x prior to 2.4.27, 2.5.x prior to 2.5.24, 2.6.x prior to 2.6.16, and 2.7.x prior to 2.7.5, logs all query parameters to tomcat’s access file. If the query parameters are used to provide authentication, ie. credentials, then they will be logged as well.
Attacker Value
Unknown

UAA SQL Identity Zone Vulnerability

Disclosure Date: July 11, 2019 (last updated November 27, 2024)
Cloud Foundry UAA version prior to 73.3.0, contain endpoints that contains improper escaping. An authenticated malicious user with basic read privileges for one identity zone can extend those reading privileges to all other identity zones and obtain private information on users, clients, and groups in all other identity zones.
Attacker Value
Unknown

UAA defaults email address to an insecure domain

Disclosure Date: June 19, 2019 (last updated November 27, 2024)
Cloud Foundry UAA, versions prior to 73.0.0, falls back to appending “unknown.org” to a user's email address when one is not provided and the user name does not contain an @ character. This domain is held by a private company, which leads to attack vectors including password recovery emails sent to a potentially fraudulent address. This would allow the attacker to gain complete control of the user's account.
0
Attacker Value
Unknown

Open Redirector in spring-security-oauth2

Disclosure Date: June 12, 2019 (last updated November 27, 2024)
Spring Security OAuth versions 2.3 prior to 2.3.6, 2.2 prior to 2.2.5, 2.1 prior to 2.1.5, and 2.0 prior to 2.0.18, as well as older unsupported versions could be susceptible to an open redirector attack that can leak an authorization code. A malicious user or attacker can craft a request to the authorization endpoint using the authorization code grant type, and specify a manipulated redirection URI via the redirect_uri parameter. This can cause the authorization server to redirect the resource owner user-agent to a URI under the control of the attacker with the leaked authorization code.
Attacker Value
Unknown

Ops Manager uaa client issues tokens after refresh token expiration

Disclosure Date: June 06, 2019 (last updated November 27, 2024)
The Pivotal Ops Manager, 2.2.x versions prior to 2.2.23, 2.3.x versions prior to 2.3.16, 2.4.x versions prior to 2.4.11, and 2.5.x versions prior to 2.5.3, contain configuration that circumvents refresh token expiration. A remote authenticated user can gain access to a browser session that was supposed to have expired, and access Ops Manager resources.
0
Attacker Value
Unknown

Additional information exposure with Spring Data JPA example matcher

Disclosure Date: June 03, 2019 (last updated November 27, 2024)
This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is supplied.
Attacker Value
Unknown

Additional information exposure with Spring Data JPA derived queries

Disclosure Date: May 06, 2019 (last updated November 27, 2024)
This affects Spring Data JPA in versions up to and including 2.1.5, 2.0.13 and 1.11.19. Derived queries using any of the predicates ‘startingWith’, ‘endingWith’ or ‘containing’ could return more results than anticipated when a maliciously crafted query parameter value is supplied. Also, LIKE expressions in manually defined queries could return unexpected results if the parameter values bound did not have escaped reserved characters properly.
0
Attacker Value
Unknown

Invitations Service supports HTTP connections

Disclosure Date: April 24, 2019 (last updated November 27, 2024)
Pivotal Apps Manager Release, versions 665.0.x prior to 665.0.28, versions 666.0.x prior to 666.0.21, versions 667.0.x prior to 667.0.7, contain an invitation service that accepts HTTP. A remote unauthenticated user could listen to network traffic and gain access to the authorization credentials used to make the invitation requests.
Attacker Value
Unknown

Concourse 5.0.0 SQL Injection vulnerability

Disclosure Date: April 01, 2019 (last updated November 27, 2024)
Pivotal Concourse version 5.0.0, contains an API that is vulnerable to SQL injection. An Concourse resource can craft a version identifier that can carry a SQL injection payload to the Concourse server, allowing the attacker to read privileged data.
0
Attacker Value
Unknown

Reflected XSS in Pivotal Operations Manager

Disclosure Date: March 07, 2019 (last updated November 27, 2024)
Pivotal Operations Manager, 2.1.x versions prior to 2.1.20, 2.2.x versions prior to 2.2.16, 2.3.x versions prior to 2.3.10, 2.4.x versions prior to 2.4.3, contains a reflected cross site scripting vulnerability. A remote user that is able to convince an Operations Manager user to interact with malicious content could execute arbitrary JavaScript in the user's browser.
0