Show filters
10 Total Results
Displaying 1-10 of 10
Sort by:
Attacker Value
Unknown
CVE-2025-22216
Disclosure Date: January 31, 2025 (last updated January 31, 2025)
A UAA configured with multiple identity zones, does not properly validate session information across those zones. A User authenticated against a corporate IDP can re-use their jsessionid to access other zones.
0
Attacker Value
Unknown
CVE-2024-38826
Disclosure Date: November 11, 2024 (last updated November 11, 2024)
Authenticated users can upload specifically crafted files to leak server resources. This behavior can potentially be used to run a denial of service attack against Cloud Controller.
The Cloud Foundry project recommends upgrading the following releases:
* Upgrade capi release version to 1.194.0 or greater
* Upgrade cf-deployment version to v44.1.0 or greater. This includes a patched capi release
0
Attacker Value
Unknown
CVE-2024-37082
Disclosure Date: July 03, 2024 (last updated July 12, 2024)
When deploying Cloud Foundry together with the haproxy-boshrelease and using a non default configuration, it might be possible to craft HTTP requests that bypass mTLS authentication to Cloud Foundry applications.
You are affected if you have route-services enabled in routing-release and have configured the haproxy-boshrelease property “ha_proxy.forwarded_client_cert” to “forward_only_if_route_service”.
0
Attacker Value
Unknown
CVE-2020-5422
Disclosure Date: October 01, 2020 (last updated February 22, 2025)
BOSH System Metrics Server releases prior to 0.1.0 exposed the UAA password as a flag to a process running on the BOSH director. It exposed the password to any user or process with access to the same VM (through ps or looking at process details).
0
Attacker Value
Unknown
Bosh Deployment logs leak sensitive information
Disclosure Date: June 19, 2019 (last updated November 27, 2024)
Cloud Foundry BOSH 270.x versions prior to v270.1.1, contain a BOSH Director that does not properly redact credentials when configured to use a MySQL database. A local authenticated malicious user may read any credentials that are contained in a BOSH manifest.
0
Attacker Value
Unknown
Timing attack allows extraction of signing key in Bits Service
Disclosure Date: December 10, 2018 (last updated November 27, 2024)
Cloud Foundry Bits Service, versions prior to 2.18.0, includes an information disclosure vulnerability. A remote malicious user may execute a timing attack to brute-force the signing key, allowing them complete read and write access to the the Bits Service storage.
0
Attacker Value
Unknown
CF networking internal policy server SQL injection
Disclosure Date: October 12, 2018 (last updated November 27, 2024)
Cloud Foundry CF Networking Release, versions 2.11.0 prior to 2.16.0, contain an internal api endpoint vulnerable to SQL injection between Diego cells and the policy server. A remote authenticated malicious user with mTLS certs can issue arbitrary SQL queries and gain access to the policy server.
0
Attacker Value
Unknown
Bosh accepts refresh tokens in place of an access token
Disclosure Date: October 05, 2018 (last updated November 27, 2024)
Cloud Foundry BOSH, versions v264 prior to v264.14.0 and v265 prior to v265.7.0 and v266 prior to v266.8.0 and v267 prior to v267.2.0, allows refresh tokens to be as access tokens when using UAA for authentication. A remote attacker with an admin refresh token given by UAA can be used to access BOSH resources without obtaining an access token, even if their user no longer has access to those resources.
0
Attacker Value
Unknown
CVE-2017-4961
Disclosure Date: June 13, 2017 (last updated November 26, 2024)
An issue was discovered in Cloud Foundry Foundation BOSH Release 261.x versions prior to 261.3 and all 260.x versions. In certain cases an authenticated Director user can provide a malicious checksum that could allow them to escalate their privileges on the Director VM, aka "BOSH Director Shell Injection Vulnerabilities."
0
Attacker Value
Unknown
CVE-2016-3091
Disclosure Date: June 08, 2017 (last updated November 26, 2024)
Cloud Foundry Diego 0.1468.0 through 0.1470.0 allows remote attackers to cause a denial of service.
0