An issue was discovered in Pivotal PCF Elastic Runtime 1.6.x versions prior to 1.6.60, 1.7.x versions prior to 1.7.41, 1.8.x versions prior to 1.8.23, and 1.9.x versions prior to 1.9.1. Incomplete validation logic in JSON Web Token (JWT) libraries can allow unprivileged attackers to impersonate other users in multiple components included in PCF Elastic Runtime, aka an "Unauthenticated JWT signing algorithm in multiple components" issue.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/97135 | Third Party Advisory VDB Entry |
https://pivotal.io/security/cve-2017-2773 | Mitigation Vendor Advisory |
http://www.securityfocus.com/bid/97135 | Third Party Advisory VDB Entry |
https://pivotal.io/security/cve-2017-2773 | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/97135 - Third Party Advisory, VDB Entry | |
References | () https://pivotal.io/security/cve-2017-2773 - Mitigation, Vendor Advisory |
Information
Published : 2017-06-13 06:29
Updated : 2024-11-21 03:24
NVD link : CVE-2017-2773
Mitre link : CVE-2017-2773
CVE.ORG link : CVE-2017-2773
JSON object : View
Products Affected
pivotal_software
- cloud_foundry_elastic_runtime
CWE
CWE-20
Improper Input Validation