Cloudfoundry

Cf-deployment

40 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.5%
  • Veröffentlicht 21.08.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:34:07

Cloud Foundry Routing (Gorouter), versions prior to 0.204.0, when used in a deployment with NGINX reverse proxies in front of the Gorouters, is potentially vulnerable to denial-of-service attacks in which an unauthenticated malicious attacker can sen...

  • EPSS 0.61%
  • Veröffentlicht 17.07.2020 16:15:11
  • Zuletzt bearbeitet 21.11.2024 05:05:48

Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.

  • EPSS 0.21%
  • Veröffentlicht 27.02.2020 20:15:11
  • Zuletzt bearbeitet 21.11.2024 05:34:04

In Cloud Foundry UAA, versions prior to 74.14.0, a CSRF vulnerability exists due to the OAuth2 state parameter not being checked in the callback function when authenticating with external identity providers.

  • EPSS 0.33%
  • Veröffentlicht 27.02.2020 20:15:11
  • Zuletzt bearbeitet 21.11.2024 05:34:04

Cloud Foundry Cloud Controller (CAPI), versions prior to 1.91.0, logs properties of background jobs when they are run, which may include sensitive information such as credentials if provided to the job. A malicious user with access to those logs may ...

  • EPSS 0.23%
  • Veröffentlicht 19.12.2019 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:20:52

Cloud Foundry Cloud Controller API (CAPI), version 1.88.0, allows space developers to list all global service brokers, including service broker URLs and GUIDs, which should only be accessible to admins.

  • EPSS 0.54%
  • Veröffentlicht 06.12.2019 20:15:09
  • Zuletzt bearbeitet 21.11.2024 04:20:52

Cloud Foundry UAA Release, versions prior to v74.10.0, when set to logging level DEBUG, logs client_secret credentials when sent as a query parameter. A remote authenticated malicious user could gain access to user credentials via the uaa.log file if...

  • EPSS 0.44%
  • Veröffentlicht 26.11.2019 00:15:11
  • Zuletzt bearbeitet 21.11.2024 04:20:51

Cloud Foundry UAA Release, versions prior to v74.8.0, logs all query parameters to tomcat’s access file. If the query parameters are used to provide authentication, ie. credentials, then they will be logged as well.

  • EPSS 0.63%
  • Veröffentlicht 19.11.2019 19:15:23
  • Zuletzt bearbeitet 21.11.2024 04:20:51

Cloud Foundry Routing, all versions before 0.193.0, does not properly validate nonce input. A remote unauthenticated malicious user could forge an HTTP route service request using an invalid nonce that will cause the Gorouter to crash.

  • EPSS 0.3%
  • Veröffentlicht 23.10.2019 16:15:11
  • Zuletzt bearbeitet 21.11.2024 04:20:50

Cloud Foundry UAA, versions prior to v74.3.0, contains an endpoint that is vulnerable to SCIM injection attack. A remote authenticated malicious user with scim.invite scope can craft a request with malicious content which can leak information about u...

  • EPSS 0.47%
  • Veröffentlicht 23.10.2019 16:15:11
  • Zuletzt bearbeitet 21.11.2024 04:20:50

Cloud Foundry SMB Volume, versions prior to v2.0.3, accidentally outputs sensitive information to the logs. A remote user with access to the SMB Volume logs can discover the username and password for volumes that have been recently created, allowing ...