Show filters
177 Total Results
Displaying 51-60 of 177
Sort by:
Attacker Value
Unknown
Pivotal Concourse allows malicious redirect urls on login
Disclosure Date: December 19, 2018 (last updated November 27, 2024)
Pivotal Concourse Release, versions 4.x prior to 4.2.2, login flow allows redirects to untrusted websites. A remote unauthenticated attacker could convince a user to click on a link using the oAuth redirect link with an untrusted website and gain access to that user's access token in Concourse.
0
Attacker Value
Unknown
UAA can issue tokens across identity providers if users with matching usernames…
Disclosure Date: December 13, 2018 (last updated November 27, 2024)
Cloud Foundry UAA, versions 60 prior to 66.0, contain an authorization logic error. In environments with multiple identity providers that contain accounts across identity providers with the same username, a remote authenticated user with access to one of these accounts may be able to obtain a token for an account of the same username in the other identity provider.
0
Attacker Value
Unknown
RabbitMQ cluster compromise due to deterministically generated cookie
Disclosure Date: December 10, 2018 (last updated November 27, 2024)
Pivotal RabbitMQ for PCF, all versions, uses a deterministically generated cookie that is shared between all machines when configured in a multi-tenant cluster. A remote attacker who can gain information about the network topology can guess this cookie and, if they have access to the right ports on any server in the MQ cluster can use this cookie to gain full control over the entire cluster.
0
Attacker Value
Unknown
NFS Volume release errand leaks cf admin credentials in logs
Disclosure Date: December 05, 2018 (last updated November 27, 2024)
Cloud Foundry NFS volume release, 1.2.x prior to 1.2.5, 1.5.x prior to 1.5.4, 1.7.x prior to 1.7.3, logs the cf admin username and password when running the nfsbrokerpush BOSH deploy errand. A remote authenticated user with access to BOSH can obtain the admin credentials for the Cloud Foundry Platform through the logs of the NFS volume deploy errand.
0
Attacker Value
Unknown
On Demand Services SDK Timing Attack Vulnerability
Disclosure Date: November 19, 2018 (last updated November 27, 2024)
Pivotal Cloud Foundry On Demand Services SDK, versions prior to 0.24 contain an insecure method of verifying credentials. A remote unauthenticated malicious user may make many requests to the service broker with different credentials, allowing them to infer valid credentials and gain access to perform broker operations.
0
Attacker Value
Unknown
UAA Privilege Escalation
Disclosure Date: November 19, 2018 (last updated November 27, 2024)
Cloud Foundry UAA release, versions prior to v64.0, and UAA, versions prior to 4.23.0, contains a validation error which allows for privilege escalation. A remote authenticated user may modify the url and content of a consent page to gain a token with arbitrary scopes that escalates their privileges.
0
Attacker Value
Unknown
CredHub Service Broker uses guessable client secret
Disclosure Date: November 13, 2018 (last updated November 27, 2024)
Pivotal CredHub Service Broker, versions prior to 1.1.0, uses a guessable form of random number generation in creating service broker's UAA client. A remote malicious user may guess the client secret and obtain or modify credentials for users of the CredHub Service.
0
Attacker Value
Unknown
Signing Key Extraction in Bits Service Release
Disclosure Date: November 09, 2018 (last updated November 27, 2024)
Cloud Foundry Bits Service Release, versions prior to 2.14.0, uses an insecure hashing algorithm to sign URLs. A remote malicious user may obtain a signed URL and extract the signing key, allowing them complete read and write access to the the Bits Service storage.
0
Attacker Value
Unknown
Pivotal Operations Manager gives all users heightened privileges
Disclosure Date: November 02, 2018 (last updated November 27, 2024)
Pivotal Operations Manager, versions 2.0.x prior to 2.0.24, versions 2.1.x prior to 2.1.15, versions 2.2.x prior to 2.2.7, and versions 2.3.x prior to 2.3.1, grants all users a scope which allows for privilege escalation. A remote malicious user who has been authenticated may create a new client with administrator privileges for Opsman.
0
Attacker Value
Unknown
Privilege Escalation in spring-security-oauth2
Disclosure Date: October 18, 2018 (last updated November 27, 2024)
Spring Security OAuth, versions 2.3 prior to 2.3.4, and 2.2 prior to 2.2.3, and 2.1 prior to 2.1.3, and 2.0 prior to 2.0.16, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can craft a request to the approval endpoint that can modify the previously saved authorization request and lead to a privilege escalation on the subsequent approval. This scenario can happen if the application is configured to use a custom approval endpoint that declares AuthorizationRequest as a controller method argument. This vulnerability exposes applications that meet all of the following requirements: Act in the role of an Authorization Server (e.g. @EnableAuthorizationServer) and use a custom Approval Endpoint that declares AuthorizationRequest as a controller method argument. This vulnerability does not expose applications that: Act in the role of an Authorization Server and use the default Approval Endpoint, act in the ro…
0