8.8
CVE-2017-4973
- EPSS 0.31%
- Veröffentlicht 13.06.2017 06:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
- Quelle security_alert@emc.com
- Teams Watchlist Login
- Unerledigt Login
An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v257; UAA release 2.x versions prior to v2.7.4.14, 3.6.x versions prior to v3.6.8, 3.9.x versions prior to v3.9.10, and other versions prior to v3.15.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.12, 24.x versions prior to v24.7, and other versions prior to v30. A vulnerability has been identified with the groups endpoint in UAA allowing users to elevate their privileges.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version <= 30
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version13.1
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version13.2
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version13.3
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version13.4
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version13.5
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version13.6
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version13.7
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version13.8
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version13.9
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version13.10
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version13.11
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version24
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version24.1
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version24.2
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version24.3
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version24.4
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version24.5
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version24.6
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version30.1
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version30.2
Cloudfoundry ≫ Cloud Foundry Uaa Bosh Version30.3
Pivotal Software ≫ Cloud Foundry Cf Version <= 256
Pivotal Software ≫ Cloud Foundry Uaa Version2.2.5.4
Pivotal Software ≫ Cloud Foundry Uaa Version2.7.1
Pivotal Software ≫ Cloud Foundry Uaa Version2.7.2
Pivotal Software ≫ Cloud Foundry Uaa Version2.7.3
Pivotal Software ≫ Cloud Foundry Uaa Version2.7.4
Pivotal Software ≫ Cloud Foundry Uaa Version2.7.4.1
Pivotal Software ≫ Cloud Foundry Uaa Version2.7.4.2
Pivotal Software ≫ Cloud Foundry Uaa Version2.7.4.3
Pivotal Software ≫ Cloud Foundry Uaa Version2.7.4.4
Pivotal Software ≫ Cloud Foundry Uaa Version2.7.4.5
Pivotal Software ≫ Cloud Foundry Uaa Version2.7.4.6
Pivotal Software ≫ Cloud Foundry Uaa Version2.7.4.7
Pivotal Software ≫ Cloud Foundry Uaa Version2.7.4.8
Pivotal Software ≫ Cloud Foundry Uaa Version2.7.4.9
Pivotal Software ≫ Cloud Foundry Uaa Version2.7.4.11
Pivotal Software ≫ Cloud Foundry Uaa Version2.7.4.12
Pivotal Software ≫ Cloud Foundry Uaa Version2.7.4.13
Pivotal Software ≫ Cloud Foundry Uaa Version3.6.1
Pivotal Software ≫ Cloud Foundry Uaa Version3.6.2
Pivotal Software ≫ Cloud Foundry Uaa Version3.6.3
Pivotal Software ≫ Cloud Foundry Uaa Version3.6.4
Pivotal Software ≫ Cloud Foundry Uaa Version3.6.5
Pivotal Software ≫ Cloud Foundry Uaa Version3.6.6
Pivotal Software ≫ Cloud Foundry Uaa Version3.6.7
Pivotal Software ≫ Cloud Foundry Uaa Version3.9.1
Pivotal Software ≫ Cloud Foundry Uaa Version3.9.2
Pivotal Software ≫ Cloud Foundry Uaa Version3.9.3
Pivotal Software ≫ Cloud Foundry Uaa Version3.9.4
Pivotal Software ≫ Cloud Foundry Uaa Version3.9.5
Pivotal Software ≫ Cloud Foundry Uaa Version3.9.6
Pivotal Software ≫ Cloud Foundry Uaa Version3.9.7
Pivotal Software ≫ Cloud Foundry Uaa Version3.9.8
Pivotal Software ≫ Cloud Foundry Uaa Version3.9.9
Pivotal Software ≫ Cloud Foundry Uaa Version3.9.12
Pivotal Software ≫ Cloud Foundry Uaa Version3.9.13
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.31% | 0.512 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 6.5 | 8 | 6.4 |
AV:N/AC:L/Au:S/C:P/I:P/A:P
|
CWE-269 Improper Privilege Management
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.