Pivotal Software

Cloud Foundry Uaa

32 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.3%
  • Published 23.10.2019 16:15:11
  • Last modified 21.11.2024 04:20:50

Cloud Foundry UAA, versions prior to v74.3.0, contains an endpoint that is vulnerable to SCIM injection attack. A remote authenticated malicious user with scim.invite scope can craft a request with malicious content which can leak information about u...

  • EPSS 0.23%
  • Published 05.08.2019 17:15:10
  • Last modified 21.11.2024 04:20:49

Cloud Foundry UAA versions prior to v73.4.0 contain a vulnerability where a malicious client possessing the 'clients.write' authority or scope can bypass the restrictions imposed on clients created via 'clients.write' and create clients with arbitrar...

  • EPSS 0.31%
  • Published 18.07.2019 16:15:12
  • Last modified 21.11.2024 04:42:33

Cloud Foundry UAA, versions prior to v73.4.0, does not set an X-FRAME-OPTIONS header on various endpoints. A remote user can perform clickjacking attacks on UAA's frontend sites.

  • EPSS 0.53%
  • Published 19.11.2018 14:29:00
  • Last modified 21.11.2024 03:51:25

Cloud Foundry UAA release, versions prior to v64.0, and UAA, versions prior to 4.23.0, contains a validation error which allows for privilege escalation. A remote authenticated user may modify the url and content of a consent page to gain a token wit...

  • EPSS 0.28%
  • Published 24.07.2018 19:29:00
  • Last modified 21.11.2024 03:42:33

Cloud Foundry UAA, versions 4.19 prior to 4.19.2 and 4.12 prior to 4.12.4 and 4.10 prior to 4.10.2 and 4.7 prior to 4.7.6 and 4.5 prior to 4.5.7, incorrectly authorizes requests to admin endpoints by accepting a valid refresh token in lieu of an acce...

  • EPSS 0.22%
  • Published 25.06.2018 15:29:00
  • Last modified 21.11.2024 03:42:33

Cloud Foundry UAA, versions later than 4.6.0 and prior to 4.19.0 except 4.10.1 and 4.7.5 and uaa-release versions later than v48 and prior to v60 except v55.1 and v52.9, does not validate redirect URL values on a form parameter used for internal UAA ...

  • EPSS 0.41%
  • Published 15.05.2018 20:29:00
  • Last modified 21.11.2024 03:59:29

Cloud Foundry Foundation UAA, versions 4.12.X and 4.13.X, introduced a feature which could allow privilege escalation across identity zones for clients performing offline validation. A zone administrator could configure their zone to issue tokens whi...

  • EPSS 0.47%
  • Published 01.02.2018 20:29:00
  • Last modified 21.11.2024 03:59:22

In Cloud Foundry Foundation cf-release versions prior to v285; cf-deployment versions prior to v1.7; UAA 4.5.x versions prior to 4.5.5, 4.8.x versions prior to 4.8.3, and 4.7.x versions prior to 4.7.4; and UAA-release 45.7.x versions prior to 45.7, 5...

  • EPSS 0.48%
  • Published 24.10.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact via vectors involving emails with password recovery links, aka "Cross Domain Refere...

  • EPSS 0.4%
  • Published 24.10.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire password reset links.