Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:E88ABB47E904FC9E6CC8E9356FB6F9EA
HistoryJul 19, 2017 - 12:00 a.m.

CVE-2017-8036: Cloud Controller API regression | Cloud Foundry

2017-07-1900:00:00
Cloud Foundry
www.cloudfoundry.org
29

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

33.3%

Severity

Critical

Vendor

Cloud Foundry Foundation

Versions Affected

  • CAPI-release version 1.33.0 only

Description

The original fix for CVE-2017-8033 included in CAPI-release 1.33.0 introduces a regression that allows a space developer to execute arbitrary code on the Cloud Controller VM by pushing a specially-crafted application.

Mitigation

Users of affected versions should apply the following mitigation or upgrade:

  • Note: The affected version of CAPI-release was not included in any cf-release.
  • Standalone component users should upgrade CAPI-release to v1.35.0 or later. [1]

Credit

This vulnerability was responsibly reported by the CAPI team.

References

History

2017-07-19: Initial vulnerability report published

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

33.3%

Related for CFOUNDRY:E88ABB47E904FC9E6CC8E9356FB6F9EA