Medium
Cloud Foundry Foundation
Cloud Foundry Cloud Controller API Release, versions prior to 1.79.0, contains improper authentication when validating user permissions. A remote authenticated malicious user with the ability to create UAA clients and knowledge of the email of a victim in the foundation may escalate their privileges to that of the victim by creating a client with a name equal to the guid of their victim.
To tell if your system was exploited, run the following in the uaadb:
select client_id, oauth_client_details.authorities from oauth_client_details join users on oauth_client_details.client_id = users.id;
If results are returned with authorities including cloud_controller.read or cloud_controller.write the vulnerability was likely exploited.
UAA admins should be wary of requests to create clients with guid-shaped client_ids and cloud_controller authorities.
Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:
2019-04-11: Initial vulnerability report published.