Pivotal Software Cloud Foundry UAA 4.8.0

CPE Details

Pivotal Software Cloud Foundry UAA 4.8.0
4.8.0
2018-06-26
16h22 +00:00
2018-06-26
16h22 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:pivotal_software:cloud_foundry_uaa:4.8.0:*:*:*:*:*:*:*

Informations

Vendor

pivotal_software

Product

cloud_foundry_uaa

Version

4.8.0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2019-11282 2019-10-23 15h28 +00:00 Cloud Foundry UAA, versions prior to v74.3.0, contains an endpoint that is vulnerable to SCIM injection attack. A remote authenticated malicious user with scim.invite scope can craft a request with malicious content which can leak information about users of the UAA.
4.3
Moyen
CVE-2019-11270 2019-08-05 16h21 +00:00 Cloud Foundry UAA versions prior to v73.4.0 contain a vulnerability where a malicious client possessing the 'clients.write' authority or scope can bypass the restrictions imposed on clients created via 'clients.write' and create clients with arbitrary scopes that the creator does not possess.
7.5
Haute
CVE-2019-3794 2019-07-18 15h47 +00:00 Cloud Foundry UAA, versions prior to v73.4.0, does not set an X-FRAME-OPTIONS header on various endpoints. A remote user can perform clickjacking attacks on UAA's frontend sites.
5.4
Moyen
CVE-2018-15761 2018-11-19 14h00 +00:00 Cloud Foundry UAA release, versions prior to v64.0, and UAA, versions prior to 4.23.0, contains a validation error which allows for privilege escalation. A remote authenticated user may modify the url and content of a consent page to gain a token with arbitrary scopes that escalates their privileges.
9.9
Critique
CVE-2018-11041 2018-06-25 15h00 +00:00 Cloud Foundry UAA, versions later than 4.6.0 and prior to 4.19.0 except 4.10.1 and 4.7.5 and uaa-release versions later than v48 and prior to v60 except v55.1 and v52.9, does not validate redirect URL values on a form parameter used for internal UAA redirects on the login page, allowing open redirects. A remote attacker can craft a malicious link that, when clicked, will redirect users to arbitrary websites after a successful login attempt.
6.1
Moyen
CVE-2018-1192 2018-02-01 19h00 +00:00 In Cloud Foundry Foundation cf-release versions prior to v285; cf-deployment versions prior to v1.7; UAA 4.5.x versions prior to 4.5.5, 4.8.x versions prior to 4.8.3, and 4.7.x versions prior to 4.7.4; and UAA-release 45.7.x versions prior to 45.7, 52.7.x versions prior to 52.7, and 53.3.x versions prior to 53.3, the SessionID is logged in audit event logs. An attacker can use the SessionID to impersonate a logged-in user.
8.8
Haute