Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Cloud_foundry_uaa_bosh
(Cloudfoundry)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 15 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2016-12-23 | CVE-2016-6659 | Cloud Foundry before 248; UAA 2.x before 2.7.4.12, 3.x before 3.6.5, and 3.7.x through 3.9.x before 3.9.3; and UAA bosh release (aka uaa-release) before 13.9 for UAA 3.6.5 and before 24 for UAA 3.9.3 allow attackers to gain privileges by accessing UAA logs and subsequently running a specially crafted application that interacts with a configured SAML provider. | Cloud_foundry_uaa_bosh, Cloud_foundry, Cloud_foundry_uaa | 8.1 | ||
2017-03-10 | CVE-2017-4960 | An issue was discovered in Cloud Foundry release v247 through v252, UAA stand-alone release v3.9.0 through v3.11.0, and UAA Bosh Release v21 through v26. There is a potential to subject the UAA OAuth clients to a denial of service attack. | Cloud_foundry_uaa_bosh, Cloud_foundry, Cloud_foundry_uaa | 7.5 | ||
2017-05-25 | CVE-2016-0781 | The UAA OAuth approval pages in Cloud Foundry v208 to v231, Login-server v1.6 to v1.14, UAA v2.0.0 to v2.7.4.1, UAA v3.0.0 to v3.2.0, UAA-Release v2 to v7 and Pivotal Elastic Runtime 1.6.x versions prior to 1.6.20 are vulnerable to an XSS attack by specifying malicious java script content in either the OAuth scopes (SCIM groups) or SCIM group descriptions. | Cloud_foundry_uaa_bosh, Cloud_foundry, Cloud_foundry_elastic_runtime, Cloud_foundry_uaa, Login\-Server | 6.1 | ||
2017-05-25 | CVE-2016-3084 | The UAA reset password flow in Cloud Foundry release v236 and earlier versions, UAA release v3.3.0 and earlier versions, all versions of Login-server, UAA release v10 and earlier versions and Pivotal Elastic Runtime versions prior to 1.7.2 is vulnerable to a brute force attack due to multiple active codes at a given time. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected. | Cloud_foundry_uaa_bosh, Cloud_foundry, Cloud_foundry_elastic_runtime, Cloud_foundry_uaa, Login\-Server | 8.1 | ||
2017-06-13 | CVE-2017-4994 | An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v263; UAA release 2.x versions prior to v2.7.4.18, 3.6.x versions prior to v3.6.12, 3.9.x versions prior to v3.9.14, and other versions prior to v4.3.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.16, 24.x versions prior to v24.11, 30.x versions prior to 30.4, and other versions prior to v40. There was an issue with forwarded http headers in UAA that could result in account corruption. | Cloud_foundry_uaa_bosh, Cloud_foundry_cf, Cloud_foundry_uaa | 7.5 |