Cloudfoundry

Routing-release

8 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.16%
  • Published 08.09.2023 08:15:07
  • Last modified 21.11.2024 08:06:27

Cloud foundry routing release versions prior to 0.278.0 are vulnerable to abuse of HTTP Hop-by-Hop Headers. An unauthenticated attacker can use this vulnerability for headers like B3 or X-B3-SpanID to affect the identification value recorded in the l...

  • EPSS 0.5%
  • Published 21.08.2020 22:15:12
  • Last modified 21.11.2024 05:34:07

Cloud Foundry Routing (Gorouter), versions prior to 0.204.0, when used in a deployment with NGINX reverse proxies in front of the Gorouters, is potentially vulnerable to denial-of-service attacks in which an unauthenticated malicious attacker can sen...

  • EPSS 0.61%
  • Published 17.07.2020 16:15:11
  • Last modified 21.11.2024 05:05:48

Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.

  • EPSS 0.73%
  • Published 19.11.2019 19:15:23
  • Last modified 21.11.2024 04:20:51

Cloud Foundry Routing, all versions before 0.193.0, does not properly validate nonce input. A remote unauthenticated malicious user could forge an HTTP route service request using an invalid nonce that will cause the Gorouter to crash.

  • EPSS 0.17%
  • Published 23.05.2018 15:29:00
  • Last modified 21.11.2024 03:59:22

Cloud Foundry routing-release, versions prior to 0.175.0, lacks sanitization for user-provided X-Forwarded-Proto headers. A remote user can set the X-Forwarded-Proto header in a request to potentially bypass an application requirement to only respond...

  • EPSS 0.36%
  • Published 19.03.2018 18:29:00
  • Last modified 21.11.2024 03:59:25

In cf-deployment before 1.14.0 and routing-release before 0.172.0, the Cloud Foundry Gorouter mishandles WebSocket requests for AWS Application Load Balancers (ALBs) and some other HTTP-aware Load Balancers. A user with developer privileges could use...

  • EPSS 0.47%
  • Published 17.07.2017 14:29:01
  • Last modified 20.04.2025 01:37:25

The Cloud Controller and Router in Cloud Foundry (CAPI-release capi versions prior to v1.32.0, Routing-release versions prior to v0.159.0, CF-release versions prior to v267) do not validate the issuer on JSON Web Tokens (JWTs) from UAA. With certain ...

  • EPSS 0.59%
  • Published 13.06.2017 06:29:00
  • Last modified 20.04.2025 01:37:25

An issue was discovered in Cloud Foundry Foundation routing-release versions prior to 0.142.0 and cf-release versions 203 to 231. Incomplete validation logic in JSON Web Token (JWT) libraries can allow unprivileged attackers to impersonate other user...