Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2016-0713


Gorouter in Cloud Foundry cf-release v141 through v228 allows man-in-the-middle attackers to conduct cross-site scripting (XSS) attacks via vectors related to modified requests.


Security Impact Summary

This vulnerability carries a MEDIUM severity rating with a CVSS v3.1 score of 4.7, indicating it can be exploited remotely over the network but requires specific conditions to be met though user interaction is required and does not require pre-existing privileges . The vulnerability impacts limited data confidentiality, limited integrity, for affected systems. Impacting 1 product from cloudfoundry organizations running these solutions should prioritize assessment and patching.

Historical Context

First disclosed in 2017, this vulnerability was reported during a period defined by widespread IoT adoption challenges, mobile security concerns, and the emergence of advanced persistent threat (APT) techniques. Contemporary mitigation strategies focused on secure development practices and third-party component vetting.


Published

2017-08-31T14:29:00.197

Last Modified

2025-04-20T01:37:25.860

Status

Deferred

Source

[email protected]

Severity

CVSSv3.0: 4.7 (MEDIUM)

CVSSv2 Vector

AV:N/AC:H/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: HIGH
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

4.9

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-79

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cloudfoundry cf-release 141 Yes
Application cloudfoundry cf-release 142 Yes
Application cloudfoundry cf-release 143 Yes
Application cloudfoundry cf-release 144 Yes
Application cloudfoundry cf-release 145 Yes
Application cloudfoundry cf-release 146 Yes
Application cloudfoundry cf-release 147 Yes
Application cloudfoundry cf-release 148 Yes
Application cloudfoundry cf-release 149 Yes
Application cloudfoundry cf-release 150 Yes
Application cloudfoundry cf-release 151 Yes
Application cloudfoundry cf-release 152 Yes
Application cloudfoundry cf-release 153 Yes
Application cloudfoundry cf-release 154 Yes
Application cloudfoundry cf-release 155 Yes
Application cloudfoundry cf-release 156 Yes
Application cloudfoundry cf-release 157 Yes
Application cloudfoundry cf-release 158 Yes
Application cloudfoundry cf-release 159 Yes
Application cloudfoundry cf-release 160 Yes
Application cloudfoundry cf-release 161 Yes
Application cloudfoundry cf-release 162 Yes
Application cloudfoundry cf-release 163 Yes
Application cloudfoundry cf-release 164 Yes
Application cloudfoundry cf-release 165 Yes
Application cloudfoundry cf-release 166 Yes
Application cloudfoundry cf-release 167 Yes
Application cloudfoundry cf-release 168 Yes
Application cloudfoundry cf-release 169 Yes
Application cloudfoundry cf-release 170 Yes
Application cloudfoundry cf-release 171 Yes
Application cloudfoundry cf-release 172 Yes
Application cloudfoundry cf-release 173 Yes
Application cloudfoundry cf-release 174 Yes
Application cloudfoundry cf-release 175 Yes
Application cloudfoundry cf-release 176 Yes
Application cloudfoundry cf-release 177 Yes
Application cloudfoundry cf-release 178 Yes
Application cloudfoundry cf-release 179 Yes
Application cloudfoundry cf-release 180 Yes
Application cloudfoundry cf-release 181 Yes
Application cloudfoundry cf-release 182 Yes
Application cloudfoundry cf-release 183 Yes
Application cloudfoundry cf-release 184 Yes
Application cloudfoundry cf-release 185 Yes
Application cloudfoundry cf-release 186 Yes
Application cloudfoundry cf-release 187 Yes
Application cloudfoundry cf-release 188 Yes
Application cloudfoundry cf-release 189 Yes
Application cloudfoundry cf-release 190 Yes
Application cloudfoundry cf-release 191 Yes
Application cloudfoundry cf-release 192 Yes
Application cloudfoundry cf-release 193 Yes
Application cloudfoundry cf-release 194 Yes
Application cloudfoundry cf-release 195 Yes
Application cloudfoundry cf-release 196 Yes
Application cloudfoundry cf-release 197 Yes
Application cloudfoundry cf-release 198 Yes
Application cloudfoundry cf-release 199 Yes
Application cloudfoundry cf-release 200 Yes
Application cloudfoundry cf-release 201 Yes
Application cloudfoundry cf-release 202 Yes
Application cloudfoundry cf-release 203 Yes
Application cloudfoundry cf-release 204 Yes
Application cloudfoundry cf-release 205 Yes
Application cloudfoundry cf-release 206 Yes
Application cloudfoundry cf-release 207 Yes
Application cloudfoundry cf-release 208 Yes
Application cloudfoundry cf-release 209 Yes
Application cloudfoundry cf-release 210 Yes
Application cloudfoundry cf-release 211 Yes
Application cloudfoundry cf-release 212 Yes
Application cloudfoundry cf-release 213 Yes
Application cloudfoundry cf-release 214 Yes
Application cloudfoundry cf-release 215 Yes
Application cloudfoundry cf-release 216 Yes
Application cloudfoundry cf-release 217 Yes
Application cloudfoundry cf-release 218 Yes
Application cloudfoundry cf-release 219 Yes
Application cloudfoundry cf-release 220 Yes
Application cloudfoundry cf-release 221 Yes
Application cloudfoundry cf-release 222 Yes
Application cloudfoundry cf-release 223 Yes
Application cloudfoundry cf-release 224 Yes
Application cloudfoundry cf-release 225 Yes
Application cloudfoundry cf-release 226 Yes
Application cloudfoundry cf-release 227 Yes
Application cloudfoundry cf-release 228 Yes

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For cloudfoundry's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.