Show filters
36 Total Results
Displaying 1-10 of 36
Sort by:
Attacker Value
Unknown

CVE-2025-22216

Disclosure Date: January 31, 2025 (last updated January 31, 2025)
A UAA configured with multiple identity zones, does not properly validate session information across those zones. A User authenticated against a corporate IDP can re-use their jsessionid to access other zones.
0
Attacker Value
Unknown

UAA is vulnerable to a Blind SCIM injection leading to information disclosure

Disclosure Date: October 23, 2019 (last updated November 27, 2024)
Cloud Foundry UAA, versions prior to v74.3.0, contains an endpoint that is vulnerable to SCIM injection attack. A remote authenticated malicious user with scim.invite scope can craft a request with malicious content which can leak information about users of the UAA.
Attacker Value
Unknown

UAA clients.write vulnerability

Disclosure Date: August 05, 2019 (last updated November 27, 2024)
Cloud Foundry UAA versions prior to v73.4.0 contain a vulnerability where a malicious client possessing the 'clients.write' authority or scope can bypass the restrictions imposed on clients created via 'clients.write' and create clients with arbitrary scopes that the creator does not possess.
Attacker Value
Unknown

UAA - Login app subject to clickjacking attack

Disclosure Date: July 18, 2019 (last updated November 27, 2024)
Cloud Foundry UAA, versions prior to v73.4.0, does not set an X-FRAME-OPTIONS header on various endpoints. A remote user can perform clickjacking attacks on UAA's frontend sites.
Attacker Value
Unknown

UAA SQL Identity Zone Vulnerability

Disclosure Date: July 11, 2019 (last updated November 27, 2024)
Cloud Foundry UAA version prior to 73.3.0, contain endpoints that contains improper escaping. An authenticated malicious user with basic read privileges for one identity zone can extend those reading privileges to all other identity zones and obtain private information on users, clients, and groups in all other identity zones.
Attacker Value
Unknown

UAA defaults email address to an insecure domain

Disclosure Date: June 19, 2019 (last updated November 27, 2024)
Cloud Foundry UAA, versions prior to 73.0.0, falls back to appending “unknown.org” to a user's email address when one is not provided and the user name does not contain an @ character. This domain is held by a private company, which leads to attack vectors including password recovery emails sent to a potentially fraudulent address. This would allow the attacker to gain complete control of the user's account.
0
Attacker Value
Unknown

UAA can issue tokens across identity providers if users with matching usernames…

Disclosure Date: December 13, 2018 (last updated November 27, 2024)
Cloud Foundry UAA, versions 60 prior to 66.0, contain an authorization logic error. In environments with multiple identity providers that contain accounts across identity providers with the same username, a remote authenticated user with access to one of these accounts may be able to obtain a token for an account of the same username in the other identity provider.
0
Attacker Value
Unknown

UAA Privilege Escalation

Disclosure Date: November 19, 2018 (last updated November 27, 2024)
Cloud Foundry UAA release, versions prior to v64.0, and UAA, versions prior to 4.23.0, contains a validation error which allows for privilege escalation. A remote authenticated user may modify the url and content of a consent page to gain a token with arbitrary scopes that escalates their privileges.
0
Attacker Value
Unknown

CVE-2018-11047

Disclosure Date: July 24, 2018 (last updated November 27, 2024)
Cloud Foundry UAA, versions 4.19 prior to 4.19.2 and 4.12 prior to 4.12.4 and 4.10 prior to 4.10.2 and 4.7 prior to 4.7.6 and 4.5 prior to 4.5.7, incorrectly authorizes requests to admin endpoints by accepting a valid refresh token in lieu of an access token. Refresh tokens by design have a longer expiration time than access tokens, allowing the possessor of a refresh token to authenticate longer than expected. This affects the administrative endpoints of the UAA. i.e. /Users, /Groups, etc. However, if the user has been deleted or had groups removed, or the client was deleted, the refresh token will no longer be valid.
0
Attacker Value
Unknown

CVE-2018-11041

Disclosure Date: June 25, 2018 (last updated November 26, 2024)
Cloud Foundry UAA, versions later than 4.6.0 and prior to 4.19.0 except 4.10.1 and 4.7.5 and uaa-release versions later than v48 and prior to v60 except v55.1 and v52.9, does not validate redirect URL values on a form parameter used for internal UAA redirects on the login page, allowing open redirects. A remote attacker can craft a malicious link that, when clicked, will redirect users to arbitrary websites after a successful login attempt.
0