Cloudfoundry

User Account And Authentication

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.15%
  • Veröffentlicht 28.03.2023 21:15:10
  • Zuletzt bearbeitet 19.02.2025 19:15:12

This disclosure regards a vulnerability related to UAA refresh tokens and external identity providers.Assuming that an external identity provider is linked to the UAA, a refresh token is issued to a client on behalf of a user from that identity provi...

  • EPSS 0.27%
  • Veröffentlicht 11.08.2021 21:15:08
  • Zuletzt bearbeitet 21.11.2024 05:49:31

UAA server versions prior to 75.4.0 are vulnerable to an open redirect vulnerability. A malicious user can exploit the open redirect vulnerability by social engineering leading to take over of victims’ accounts in certain cases along with redirection...

  • EPSS 0.32%
  • Veröffentlicht 22.07.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 05:49:25

In UAA versions prior to 75.3.0, sensitive information like relaying secret of the provider was revealed in response when deletion request of an identity provider( IdP) of type “oauth 1.0” was sent to UAA server.

  • EPSS 0.21%
  • Veröffentlicht 27.02.2020 20:15:11
  • Zuletzt bearbeitet 21.11.2024 05:34:04

In Cloud Foundry UAA, versions prior to 74.14.0, a CSRF vulnerability exists due to the OAuth2 state parameter not being checked in the callback function when authenticating with external identity providers.

  • EPSS 0.57%
  • Veröffentlicht 06.12.2019 20:15:09
  • Zuletzt bearbeitet 21.11.2024 04:20:52

Cloud Foundry UAA Release, versions prior to v74.10.0, when set to logging level DEBUG, logs client_secret credentials when sent as a query parameter. A remote authenticated malicious user could gain access to user credentials via the uaa.log file if...

  • EPSS 0.46%
  • Veröffentlicht 26.11.2019 00:15:11
  • Zuletzt bearbeitet 21.11.2024 04:20:51

Cloud Foundry UAA Release, versions prior to v74.8.0, logs all query parameters to tomcat’s access file. If the query parameters are used to provide authentication, ie. credentials, then they will be logged as well.

  • EPSS 0.45%
  • Veröffentlicht 26.09.2019 21:15:10
  • Zuletzt bearbeitet 21.11.2024 04:20:50

CF UAA versions prior to 74.1.0, allow external input to be directly queried against. A remote malicious user with 'client.write' and 'groups.update' can craft a SCIM query, which leaks information that allows an escalation of privileges, ultimately ...

  • EPSS 0.36%
  • Veröffentlicht 09.08.2019 20:15:11
  • Zuletzt bearbeitet 21.11.2024 04:20:49

Cloud Foundry UAA, versions prior to 74.0.0, is vulnerable to an XSS attack. A remote unauthenticated malicious attacker could craft a URL that contains a SCIM filter that contains malicious JavaScript, which older browsers may execute.

  • EPSS 0.41%
  • Veröffentlicht 07.09.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The identity zones feature in Pivotal Cloud Foundry 208 through 229; UAA 2.0.0 through 2.7.3 and 3.0.0; UAA-Release 2 through 4, when configured with multiple identity zones; and Elastic Runtime 1.6.0 through 1.6.13 allows remote authenticated users ...