Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2016-6658


Applications in cf-release before 245 can be configured and pushed with a user-provided custom buildpack using a URL pointing to the buildpack. Although it is not recommended, a user can specify a credential in the URL (basic auth or OAuth) to access the buildpack through the CLI. For example, the user could include a GitHub username and password in the URL to access a private repo. Because the URL to access the buildpack is stored unencrypted, an operator with privileged access to the Cloud Controller database could view these credentials.


Published

2018-03-29T22:29:00.477

Last Modified

2024-11-21T02:56:34.143

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 9.6 (CRITICAL)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

8.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-200

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cloudfoundry cf-release < 245 Yes
Application pivotal_software cloud_foundry_elastic_runtime < 1.6.49 Yes
Application pivotal_software cloud_foundry_elastic_runtime < 1.7.31 Yes
Application pivotal_software cloud_foundry_elastic_runtime < 1.8.11 Yes

References