An issue was discovered in Pivotal GemFire for PCF 1.6.x versions prior to 1.6.5 and 1.7.x versions prior to 1.7.1. The gfsh (Geode Shell) endpoint, used by operators and application developers to connect to their cluster, is unauthenticated and publicly accessible. Because HTTPS communications are terminated at the gorouter, communications from the gorouter to GemFire clusters are unencrypted. An attacker could run any command available on gfsh and could cause denial of service, lost confidentiality of data, escalate privileges, or eavesdrop on other communications between the gorouter and the cluster.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/95270 | |
https://pivotal.io/security/cve-2016-9885 | Vendor Advisory |
http://www.securityfocus.com/bid/95270 | |
https://pivotal.io/security/cve-2016-9885 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/95270 - | |
References | () https://pivotal.io/security/cve-2016-9885 - Vendor Advisory |
Information
Published : 2017-01-06 22:59
Updated : 2024-11-21 03:01
NVD link : CVE-2016-9885
Mitre link : CVE-2016-9885
CVE.ORG link : CVE-2016-9885
JSON object : View
Products Affected
pivotal_software
- gemfire_for_pivotal_cloud_foundry