8
CVE-2020-5400
- EPSS 0.33%
- Veröffentlicht 27.02.2020 20:15:11
- Zuletzt bearbeitet 21.11.2024 05:34:04
- Quelle security@pivotal.io
- Teams Watchlist Login
- Unerledigt Login
Cloud Foundry Cloud Controller (CAPI), versions prior to 1.91.0, logs properties of background jobs when they are run, which may include sensitive information such as credentials if provided to the job. A malicious user with access to those logs may gain unauthorized access to resources protected by such credentials.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cloudfoundry ≫ Capi-release Version < 1.91.0
Cloudfoundry ≫ Cf-deployment Version < 12.33.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.33% | 0.549 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
nvd@nist.gov | 4 | 8 | 2.9 |
AV:N/AC:L/Au:S/C:P/I:N/A:N
|
security@pivotal.io | 8 | 1.3 | 6 |
CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
|
CWE-522 Insufficiently Protected Credentials
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
CWE-532 Insertion of Sensitive Information into Log File
The product writes sensitive information to a log file.