Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:3B946330401ABBD325F7EE306F8503F9
HistoryFeb 25, 2019 - 12:00 a.m.

CVE-2019-3781: CF CLI does not sanitize user's password in verbose/trace/debug | Cloud Foundry

2019-02-2500:00:00
Cloud Foundry
www.cloudfoundry.org
50

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:N/A:N

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

71.6%

Severity

High

Vendor

Cloud Foundry Foundation

Affected Cloud Foundry Products and Versions

Severity is high unless otherwise noted.

  • CF CLI
    • All versions prior to v6.43.0
  • CF CLI Release
    • All versions prior to v1.13.0
  • CF Networking Release
    • All versions Prior to v2.23.0
  • CF Routing Release
    • All versions Prior to v0.189.0
  • CF Smoke Tests
    • All versions Prior to v40.0.113
  • CF Deployment
    • All versions Prior to v10.0.0
  • CF Deployment Concourse Tasks
    • All versions Prior to v9.3.0
  • CF Log Cache Release
    • All versions Prior to v2.3.1
  • CF Notifications
    • All versions Prior to v58

Description

CF CLI versions prior to v6.43.0, and CF CLI Release versions prior to v1.13.0, improperly expose passwords when verbose/trace/debugging is turned on. A local unauthenticated or remote authenticated malicious user with access to logs may gain part or all of a users password.

Mitigation

Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:

  • CF CLI
    • Upgrade all versions to v6.43.0 or greater
  • CF CLI Release
    • Upgrade all versions to v1.13.0 or greater
  • CF Networking Release
    • Upgrade all versions to v2.23.0 or greater
  • CF Routing Release
    • Upgrade all versions to v0.189.0 or greater
  • CF Smoke Tests
    • Upgrade all versions to v40.0.113 or greater
  • CF Deployment
    • Upgrade all versions to v10.0.0 or greater
  • CF Deployment Concourse Tasks
    • Upgrade all versions to v9.3.0 or greater
  • CF Log Cache Release
    • Upgrade all versions to v2.3.1 or greater
  • CF Notifications
    • Upgrade all versions to v58 or greater

Credit

This issue was responsibly reported by Swisscom.

History

2019-02-25: Initial vulnerability report published.

2019-04-03: Details about CF CLI Release added.

2019-07-24: Add additional affected products and mitigation steps.

2019-07-26: Add CF Deployment Concourse Tasks to the list.

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:N/A:N

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

71.6%

Related for CFOUNDRY:3B946330401ABBD325F7EE306F8503F9