Cloud Foundry cf-release 279

CPE Details

Cloud Foundry cf-release 279
279
2019-06-05
13h04 +00:00
2019-06-05
13h04 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:cloudfoundry:cf-release:279:*:*:*:*:*:*:*

Informations

Vendor

cloudfoundry

Product

cf-release

Version

279

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2018-1195 2018-03-19 18h00 +00:00 In Cloud Controller versions prior to 1.46.0, cf-deployment versions prior to 1.3.0, and cf-release versions prior to 283, Cloud Controller accepts refresh tokens for authentication where access tokens are expected. This exposes a vulnerability where a refresh token that would otherwise be insufficient to obtain an access token, either due to lack of client credentials or revocation, would allow authentication.
8.8
Haute
CVE-2017-14389 2017-11-28 06h00 +00:00 An issue was discovered in Cloud Foundry Foundation capi-release (all versions prior to 1.45.0), cf-release (all versions prior to v280), and cf-deployment (all versions prior to v1.0.0). The Cloud Controller does not prevent space developers from creating subdomains to an already existing route that belongs to a different user in a different org and space, aka an "Application Subdomain Takeover."
6.5
Moyen
CVE-2017-4974 2017-06-13 04h00 +00:00 An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v258; UAA release 2.x versions prior to v2.7.4.15, 3.6.x versions prior to v3.6.9, 3.9.x versions prior to v3.9.11, and other versions prior to v3.16.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.13, 24.x versions prior to v24.8, and other versions prior to v30.1. An authorized user can use a blind SQL injection attack to query the contents of the UAA database, aka "Blind SQL Injection with privileged UAA endpoints."
6.5
Moyen