RSS   Vulnerabilities for
'Gemfire for pivotal cloud foundry'
   RSS

2018-03-16
 
CVE-2016-9880

CWE-287
 

 
The GemFire broker for Cloud Foundry 1.6.x before 1.6.5 and 1.7.x before 1.7.1 has multiple API endpoints which do not require authentication and could be used to gain access to the cluster managed by the broker.

 
2017-01-06
 
CVE-2016-9885

 

 
An issue was discovered in Pivotal GemFire for PCF 1.6.x versions prior to 1.6.5 and 1.7.x versions prior to 1.7.1. The gfsh (Geode Shell) endpoint, used by operators and application developers to connect to their cluster, is unauthenticated and publicly accessible. Because HTTPS communications are terminated at the gorouter, communications from the gorouter to GemFire clusters are unencrypted. An attacker could run any command available on gfsh and could cause denial of service, lost confidentiality of data, escalate privileges, or eavesdrop on other communications between the gorouter and the cluster.

 

 >>> Vendor: Pivotal software 48 Products
Rabbitmq management
Rabbitmq
Spring framework
Redis
Cloud foundry
Cloud foundry elastic runtime
Cloud foundry ops manager
Cloud foundry uaa
Cloud foundry uaa bosh
Operations manager
Spring data jpa
Cloud foundry cf mysql
Greenplum
Gemfire for pivotal cloud foundry
Spring security
Cloud foundry elastic runtime cf release
Cloud foundry uaa release
Login-server
Cloud foundry cf release
Cloud foundry garden linux
Cloud foundry cf
Spring social
Single sign-on for pivotal cloud foundry
Grootfs
Spring advanced message queuing protocol
Cf-deployment
Spring-ldap
Cf-release
Uaa-release
Credhub-release
Spring data rest
Cloud foundry uaa-release
Spring boot
Spring batch admin
Mysql
Spring data commons
Spring cloud sso connector
Spring security oauth
Windows stemcells
Spring integration zip
Pivotal application service
Cloud foundry cf-deployment
Cloudfoundry uaa release
Cloudfoundry uaa
Spring batch
Spring integration
Spring web services
Concourse


Copyright 2019, cxsecurity.com

 

Back to Top