Cloud Foundry User Account and Authentication (UAA) 2.7.4.15

CPE Details

Cloud Foundry User Account and Authentication (UAA) 2.7.4.15
2.7.4.15
2019-10-07
14h22 +00:00
2021-08-17
10h42 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:cloudfoundry:user_account_and_authentication:2.7.4.15:*:*:*:*:*:*:*

Informations

Vendor

cloudfoundry

Product

user_account_and_authentication

Version

2.7.4.15

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-20903 2023-03-28 00h00 +00:00 This disclosure regards a vulnerability related to UAA refresh tokens and external identity providers.Assuming that an external identity provider is linked to the UAA, a refresh token is issued to a client on behalf of a user from that identity provider, the administrator of the UAA deactivates the identity provider from the UAA. It is expected that the UAA would reject a refresh token during a refresh token grant, but it does not (hence the vulnerability). It will continue to issue access tokens to request presenting such refresh tokens, as if the identity provider was still active. As a result, clients with refresh tokens issued through the deactivated identity provider would still have access to Cloud Foundry resources until their refresh token expires (which defaults to 30 days).
4.3
Medium
CVE-2021-22098 2021-08-11 18h49 +00:00 UAA server versions prior to 75.4.0 are vulnerable to an open redirect vulnerability. A malicious user can exploit the open redirect vulnerability by social engineering leading to take over of victims’ accounts in certain cases along with redirection of UAA users to a malicious sites.
6.1
Medium
CVE-2021-22001 2021-07-22 11h17 +00:00 In UAA versions prior to 75.3.0, sensitive information like relaying secret of the provider was revealed in response when deletion request of an identity provider( IdP) of type “oauth 1.0” was sent to UAA server.
7.5
High
CVE-2020-5402 2020-02-27 19h30 +00:00 In Cloud Foundry UAA, versions prior to 74.14.0, a CSRF vulnerability exists due to the OAuth2 state parameter not being checked in the callback function when authenticating with external identity providers.
8.8
High
CVE-2019-11293 2019-12-06 20h00 +00:00 Cloud Foundry UAA Release, versions prior to v74.10.0, when set to logging level DEBUG, logs client_secret credentials when sent as a query parameter. A remote authenticated malicious user could gain access to user credentials via the uaa.log file if authentication is provided via query parameters.
6.5
Medium
CVE-2019-11290 2019-11-25 23h56 +00:00 Cloud Foundry UAA Release, versions prior to v74.8.0, logs all query parameters to tomcat’s access file. If the query parameters are used to provide authentication, ie. credentials, then they will be logged as well.
7.5
High
CVE-2019-11278 2019-09-26 21h11 +00:00 CF UAA versions prior to 74.1.0, allow external input to be directly queried against. A remote malicious user with 'client.write' and 'groups.update' can craft a SCIM query, which leaks information that allows an escalation of privileges, ultimately allowing the malicious user to gain control of UAA scopes they should not have.
8.8
High
CVE-2019-11274 2019-08-09 19h22 +00:00 Cloud Foundry UAA, versions prior to 74.0.0, is vulnerable to an XSS attack. A remote unauthenticated malicious attacker could craft a URL that contains a SCIM filter that contains malicious JavaScript, which older browsers may execute.
6.1
Medium