Cloudfoundry

Cf-deployment

40 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 30.04.2026 23:17:00
  • Zuletzt bearbeitet 04.05.2026 18:30:01

Route Services can be leveraged to send app traffic to network destinations outside of an app's configured egress rules. As a result, a malicious developer with access to Cloudfoundry could configure a route-service that would allow it to send reques...

  • EPSS 0.02%
  • Veröffentlicht 16.04.2026 23:33:43
  • Zuletzt bearbeitet 17.04.2026 15:38:09

Cloud Foundry UUA is vulnerable to a bypass that allows an attacker to obtain a token for any user and gain access to UAA-protected systems. This vulnerability exists when SAML 2.0 bearer assertions are enabled for a client, as the UAA accepts SAML 2...

  • EPSS 0.01%
  • Veröffentlicht 17.03.2026 22:45:09
  • Zuletzt bearbeitet 18.03.2026 14:52:44

Unprotected internal endpoints in Cloud Foundry Capi Release 1.226.0 and below, and CF Deployment v54.9.0 and below on all platforms allows any user who has bypassed the firewall to potentially replace droplets and therefore applications allowing the...

  • EPSS 0.08%
  • Veröffentlicht 05.03.2026 20:40:27
  • Zuletzt bearbeitet 10.05.2026 14:16:48

Inappropriate user token revocation due to a logic error in the token revocation endpoint implementation in Cloudfoundry UAA v77.30.0 to v78.7.0 and in Cloudfoundry Deployment v48.7.0 to v54.10.0.

  • EPSS 0.19%
  • Veröffentlicht 13.05.2025 05:14:40
  • Zuletzt bearbeitet 11.07.2025 15:50:39

Cloud Foundry UAA release versions from v77.21.0 to v7.31.0 are vulnerable to a private key exposure in logs.

  • EPSS 0.17%
  • Veröffentlicht 11.11.2024 06:15:04
  • Zuletzt bearbeitet 15.04.2026 00:35:42

Authenticated users can upload specifically crafted files to leak server resources. This behavior can potentially be used to run a denial of service attack against Cloud Controller. The Cloud Foundry project recommends upgrading the following releas...

  • EPSS 0.53%
  • Veröffentlicht 10.06.2024 20:15:12
  • Zuletzt bearbeitet 21.11.2024 08:55:57

Improper handling of requests in Routing Release > v0.273.0 and <= v0.297.0 allows an unauthenticated attacker to degrade the service availability of the Cloud Foundry deployment if performed at scale.

  • EPSS 0.16%
  • Veröffentlicht 08.09.2023 08:15:07
  • Zuletzt bearbeitet 21.11.2024 08:06:27

Cloud foundry routing release versions prior to 0.278.0 are vulnerable to abuse of HTTP Hop-by-Hop Headers. An unauthenticated attacker can use this vulnerability for headers like B3 or X-B3-SpanID to affect the identification value recorded in the l...

  • EPSS 0.18%
  • Veröffentlicht 26.05.2023 17:15:13
  • Zuletzt bearbeitet 16.01.2025 15:15:09

In Cloud foundry routing release versions from 0.262.0 and prior to 0.266.0,a bug in the gorouter process can lead to a denial of service of applications hosted on Cloud Foundry. Under the right circumstances, when client connections are closed prema...

  • EPSS 0.15%
  • Veröffentlicht 19.05.2023 15:15:08
  • Zuletzt bearbeitet 21.01.2025 20:15:28

Cloud foundry instances having CAPI version between 1.140 and 1.152.0 along with loggregator-agent v7+ may override other users syslog drain credentials if they're aware of the client certificate used for that syslog drain. This applies even if the d...