Cloud Foundry before 248; UAA 2.x before 2.7.4.12, 3.x before 3.6.5, and 3.7.x through 3.9.x before 3.9.3; and UAA bosh release (aka uaa-release) before 13.9 for UAA 3.6.5 and before 24 for UAA 3.9.3 allow attackers to gain privileges by accessing UAA logs and subsequently running a specially crafted application that interacts with a configured SAML provider.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/95085 | |
https://www.cloudfoundry.org/cve-2016-6659/ | Vendor Advisory |
http://www.securityfocus.com/bid/95085 | |
https://www.cloudfoundry.org/cve-2016-6659/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/95085 - | |
References | () https://www.cloudfoundry.org/cve-2016-6659/ - Vendor Advisory |
Information
Published : 2016-12-23 05:59
Updated : 2024-11-21 02:56
NVD link : CVE-2016-6659
Mitre link : CVE-2016-6659
CVE.ORG link : CVE-2016-6659
JSON object : View
Products Affected
pivotal_software
- cloud_foundry
- cloud_foundry_uaa
cloudfoundry
- cloud_foundry_uaa_bosh
CWE
CWE-287
Improper Authentication