RSS   Vulnerabilities for
'Cloud foundry elastic runtime cf release'
   RSS

2017-05-25
 
CVE-2016-0780

 

 
It was discovered that cf-release v231 and lower, Pivotal Cloud Foundry Elastic Runtime 1.5.x versions prior to 1.5.17 and Pivotal Cloud Foundry Elastic Runtime 1.6.x versions prior to 1.6.18 do not properly enforce disk quotas in certain cases. An attacker could use an improper disk quota value to bypass enforcement and consume all the disk on DEAs/CELLs causing a potential denial of service for other applications.

 
 
CVE-2015-3191

 

 
With Cloud Foundry Runtime cf-release versions v209 or earlier, UAA Standalone versions 2.2.6 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier the change_email form in UAA is vulnerable to a CSRF attack. This allows an attacker to trigger an e-mail change for a user logged into a cloud foundry instance via a malicious link on a attacker controlled site. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected.

 
 
CVE-2015-3190

 

 
With Cloud Foundry Runtime cf-release versions v209 or earlier, UAA Standalone versions 2.2.6 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier the UAA logout link is susceptible to an open redirect which allows an attacker to insert malicious web page as a redirect parameter.

 
 
CVE-2015-3189

 

 
With Cloud Foundry Runtime cf-release versions v208 or earlier, UAA Standalone versions 2.2.5 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier, old Password Reset Links are not expired after the user changes their current email address to a new one. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected.

 
 
CVE-2015-1834

 

 
A path traversal vulnerability was identified in the Cloud Foundry component Cloud Controller that affects cf-release versions prior to v208 and Pivotal Cloud Foundry Elastic Runtime versions prior to 1.4.2. Path traversal is the 'outbreak' of a given directory structure through relative file paths in the user input. It aims at accessing files and directories that are stored outside the web root folder, for disallowed reading or even executing arbitrary system commands. An attacker could use a certain parameter of the file path for instance to inject '../' sequences in order to navigate through the file system. In this particular case a remote authenticated attacker can exploit the identified vulnerability in order to upload arbitrary files to the server running a Cloud Controller instance - outside the isolated application container.

 

 >>> Vendor: Pivotal software 54 Products
Mysql
Operations manager
Spring framework
Rabbitmq management
Rabbitmq
Redis
Cloud foundry elastic runtime
Cloud foundry
Cloud foundry ops manager
Cloud foundry uaa
Cloud foundry uaa bosh
Spring data jpa
Cloud foundry cf mysql
Greenplum
Gemfire for pivotal cloud foundry
Spring security
Cf-release
Cloud foundry elastic runtime cf release
Cloud foundry uaa release
Login-server
Cloud foundry cf release
Cloud foundry garden linux
Spring security oauth
Cloud foundry cf
Spring batch admin
Spring social
Uaa-release
Single sign-on for pivotal cloud foundry
Grootfs
Spring advanced message queuing protocol
Cf-deployment
Spring-ldap
Credhub-release
Spring data rest
Cloud foundry uaa-release
Spring boot
Spring data commons
Spring cloud sso connector
Windows stemcells
Spring integration zip
Pivotal application service
Cloud foundry cf-deployment
Cloudfoundry uaa release
Cloudfoundry uaa
Spring batch
Spring integration
Spring web services
Concourse
Cloud foundry cf-release
Application service
Pivotal container service
Bosh cli
Credhub service broker
Spring data java persistance api


Copyright 2024, cxsecurity.com

 

Back to Top