Lucene search

K
cve[email protected]CVE-2018-11083
HistoryOct 05, 2018 - 9:29 p.m.

CVE-2018-11083

2018-10-0521:29:00
web.nvd.nist.gov
23
cloud foundry
bosh
v264
v265
v266
v267
uaa
authentication
access tokens
cve-2018-11083

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

64.9%

Cloud Foundry BOSH, versions v264 prior to v264.14.0 and v265 prior to v265.7.0 and v266 prior to v266.8.0 and v267 prior to v267.2.0, allows refresh tokens to be as access tokens when using UAA for authentication. A remote attacker with an admin refresh token given by UAA can be used to access BOSH resources without obtaining an access token, even if their user no longer has access to those resources.

Affected configurations

NVD
Node
cloud_foundryboshRange264.1264.14.0
OR
cloud_foundryboshRange265.1.0265.7.0
OR
cloud_foundryboshRange266.2.0266.8.0

CNA Affected

[
  {
    "product": "BOSH",
    "vendor": "Cloud Foundry",
    "versions": [
      {
        "lessThan": "v264.14.0",
        "status": "affected",
        "version": "264",
        "versionType": "custom"
      },
      {
        "lessThan": "v265.7.0",
        "status": "affected",
        "version": "265",
        "versionType": "custom"
      },
      {
        "lessThan": "v266.8.0",
        "status": "affected",
        "version": "266",
        "versionType": "custom"
      },
      {
        "lessThan": "v267.2.0",
        "status": "affected",
        "version": "267",
        "versionType": "custom"
      }
    ]
  }
]

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

64.9%

Related for CVE-2018-11083