Cloudfoundry

Cf-deployment

36 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 13.05.2025 05:14:40
  • Zuletzt bearbeitet 11.07.2025 15:50:39

Cloud Foundry UAA release versions from v77.21.0 to v7.31.0 are vulnerable to a private key exposure in logs.

  • EPSS 0.16%
  • Veröffentlicht 11.11.2024 06:15:04
  • Zuletzt bearbeitet 17.03.2025 22:15:12

Authenticated users can upload specifically crafted files to leak server resources. This behavior can potentially be used to run a denial of service attack against Cloud Controller. The Cloud Foundry project recommends upgrading the following releas...

  • EPSS 0.53%
  • Veröffentlicht 10.06.2024 20:15:12
  • Zuletzt bearbeitet 21.11.2024 08:55:57

Improper handling of requests in Routing Release > v0.273.0 and <= v0.297.0 allows an unauthenticated attacker to degrade the service availability of the Cloud Foundry deployment if performed at scale.

  • EPSS 0.16%
  • Veröffentlicht 08.09.2023 08:15:07
  • Zuletzt bearbeitet 21.11.2024 08:06:27

Cloud foundry routing release versions prior to 0.278.0 are vulnerable to abuse of HTTP Hop-by-Hop Headers. An unauthenticated attacker can use this vulnerability for headers like B3 or X-B3-SpanID to affect the identification value recorded in the l...

  • EPSS 0.18%
  • Veröffentlicht 26.05.2023 17:15:13
  • Zuletzt bearbeitet 16.01.2025 15:15:09

In Cloud foundry routing release versions from 0.262.0 and prior to 0.266.0,a bug in the gorouter process can lead to a denial of service of applications hosted on Cloud Foundry. Under the right circumstances, when client connections are closed prema...

  • EPSS 0.11%
  • Veröffentlicht 19.05.2023 15:15:08
  • Zuletzt bearbeitet 21.01.2025 20:15:28

Cloud foundry instances having CAPI version between 1.140 and 1.152.0 along with loggregator-agent v7+ may override other users syslog drain credentials if they're aware of the client certificate used for that syslog drain. This applies even if the d...

  • EPSS 0.12%
  • Veröffentlicht 03.02.2023 19:15:11
  • Zuletzt bearbeitet 25.03.2025 20:15:13

Starting with diego-release 2.55.0 and up to 2.69.0, and starting with CF Deployment 17.1 and up to 23.2.0, apps are accessible via another port on diego cells, allowing application ingress without a client certificate. If mTLS route integrity is ena...

  • EPSS 0.52%
  • Veröffentlicht 25.03.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:49:31

In cloud foundry CAPI versions prior to 1.122, a denial-of-service attack in which a developer can push a service broker that (accidentally or maliciously) causes CC instances to timeout and fail is possible. An attacker can leverage this vulnerabili...

  • EPSS 0.98%
  • Veröffentlicht 27.10.2021 15:15:07
  • Zuletzt bearbeitet 21.11.2024 05:49:31

Cloud Controller versions prior to 1.118.0 are vulnerable to unauthenticated denial of Service(DoS) vulnerability allowing unauthenticated attackers to cause denial of service by using REST HTTP requests with label_selectors on multiple V3 endpoints ...

  • EPSS 0.27%
  • Veröffentlicht 11.08.2021 21:15:08
  • Zuletzt bearbeitet 21.11.2024 05:49:31

UAA server versions prior to 75.4.0 are vulnerable to an open redirect vulnerability. A malicious user can exploit the open redirect vulnerability by social engineering leading to take over of victims’ accounts in certain cases along with redirection...