9.8
CVE-2019-3801
- EPSS 0.07%
- Published 25.04.2019 21:29:00
- Last modified 21.11.2024 04:42:34
- Source security_alert@emc.com
- Teams watchlist Login
- Open Login
Cloud Foundry cf-deployment, versions prior to 7.9.0, contain java components that are using an insecure protocol to fetch dependencies when building. A remote unauthenticated malicious attacker could hijack the DNS entry for the dependency, and inject malicious code into the component.
Data is provided by the National Vulnerability Database (NVD)
Cloudfoundry ≫ Cf-deployment Version < 7.9.0
Cloudfoundry ≫ Credhub Version >= 1.9 < 1.9.10
Cloudfoundry ≫ Credhub Version >= 2.1 < 2.1.3
Cloudfoundry ≫ Uaa Release Version < 64.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.07% | 0.186 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:P/A:N
|
security_alert@emc.com | 8.7 | 2.2 | 5.8 |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
|
CWE-319 Cleartext Transmission of Sensitive Information
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
CWE-494 Download of Code Without Integrity Check
The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code.