8
CVE-2020-5400
- EPSS 0.33%
- Published 27.02.2020 20:15:11
- Last modified 21.11.2024 05:34:04
- Source security@pivotal.io
- Teams watchlist Login
- Open Login
Cloud Foundry Cloud Controller (CAPI), versions prior to 1.91.0, logs properties of background jobs when they are run, which may include sensitive information such as credentials if provided to the job. A malicious user with access to those logs may gain unauthorized access to resources protected by such credentials.
Data is provided by the National Vulnerability Database (NVD)
Cloudfoundry ≫ Capi-release Version < 1.91.0
Cloudfoundry ≫ Cf-deployment Version < 12.33.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.33% | 0.549 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
nvd@nist.gov | 4 | 8 | 2.9 |
AV:N/AC:L/Au:S/C:P/I:N/A:N
|
security@pivotal.io | 8 | 1.3 | 6 |
CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
|
CWE-522 Insufficiently Protected Credentials
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
CWE-532 Insertion of Sensitive Information into Log File
The product writes sensitive information to a log file.