Cloudfoundry

Cf-deployment

38 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 17.03.2026 22:45:09
  • Zuletzt bearbeitet 18.03.2026 14:52:44

Unprotected internal endpoints in Cloud Foundry Capi Release 1.226.0 and below, and CF Deployment v54.9.0 and below on all platforms allows any user who has bypassed the firewall to potentially replace droplets and therefore applications allowing the...

  • EPSS 0.05%
  • Veröffentlicht 05.03.2026 20:40:27
  • Zuletzt bearbeitet 17.03.2026 18:35:29

Inappropriate user token revocation due to a logic error in the token revocation endpoint implementation in Cloudfoundry UAA v77.30.0 to v78.7.0 and in Cloudfoundry Deployment v48.7.0 to v54.10.0.

  • EPSS 0.19%
  • Veröffentlicht 13.05.2025 05:14:40
  • Zuletzt bearbeitet 11.07.2025 15:50:39

Cloud Foundry UAA release versions from v77.21.0 to v7.31.0 are vulnerable to a private key exposure in logs.

  • EPSS 0.12%
  • Veröffentlicht 11.11.2024 06:15:04
  • Zuletzt bearbeitet 17.03.2025 22:15:12

Authenticated users can upload specifically crafted files to leak server resources. This behavior can potentially be used to run a denial of service attack against Cloud Controller. The Cloud Foundry project recommends upgrading the following releas...

  • EPSS 0.53%
  • Veröffentlicht 10.06.2024 20:15:12
  • Zuletzt bearbeitet 21.11.2024 08:55:57

Improper handling of requests in Routing Release > v0.273.0 and <= v0.297.0 allows an unauthenticated attacker to degrade the service availability of the Cloud Foundry deployment if performed at scale.

  • EPSS 0.16%
  • Veröffentlicht 08.09.2023 08:15:07
  • Zuletzt bearbeitet 21.11.2024 08:06:27

Cloud foundry routing release versions prior to 0.278.0 are vulnerable to abuse of HTTP Hop-by-Hop Headers. An unauthenticated attacker can use this vulnerability for headers like B3 or X-B3-SpanID to affect the identification value recorded in the l...

  • EPSS 0.18%
  • Veröffentlicht 26.05.2023 17:15:13
  • Zuletzt bearbeitet 16.01.2025 15:15:09

In Cloud foundry routing release versions from 0.262.0 and prior to 0.266.0,a bug in the gorouter process can lead to a denial of service of applications hosted on Cloud Foundry. Under the right circumstances, when client connections are closed prema...

  • EPSS 0.15%
  • Veröffentlicht 19.05.2023 15:15:08
  • Zuletzt bearbeitet 21.01.2025 20:15:28

Cloud foundry instances having CAPI version between 1.140 and 1.152.0 along with loggregator-agent v7+ may override other users syslog drain credentials if they're aware of the client certificate used for that syslog drain. This applies even if the d...

  • EPSS 0.14%
  • Veröffentlicht 03.02.2023 19:15:11
  • Zuletzt bearbeitet 25.03.2025 20:15:13

Starting with diego-release 2.55.0 and up to 2.69.0, and starting with CF Deployment 17.1 and up to 23.2.0, apps are accessible via another port on diego cells, allowing application ingress without a client certificate. If mTLS route integrity is ena...

  • EPSS 0.38%
  • Veröffentlicht 25.03.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:49:31

In cloud foundry CAPI versions prior to 1.122, a denial-of-service attack in which a developer can push a service broker that (accidentally or maliciously) causes CC instances to timeout and fail is possible. An attacker can leverage this vulnerabili...