The Cloud Controller and Router in Cloud Foundry (CAPI-release capi versions prior to v1.32.0, Routing-release versions prior to v0.159.0, CF-release versions prior to v267) do not validate the issuer on JSON Web Tokens (JWTs) from UAA. With certain multi-zone UAA configurations, zone administrators are able to escalate their privileges.
References
Link | Resource |
---|---|
https://www.cloudfoundry.org/cve-2017-8034/ | Vendor Advisory |
https://www.cloudfoundry.org/cve-2017-8034/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cloudfoundry.org/cve-2017-8034/ - Vendor Advisory |
Information
Published : 2017-07-17 14:29
Updated : 2024-11-21 03:33
NVD link : CVE-2017-8034
Mitre link : CVE-2017-8034
CVE.ORG link : CVE-2017-8034
JSON object : View
Products Affected
cloudfoundry
- cf-release
- routing-release
- capi-release
CWE
CWE-565
Reliance on Cookies without Validation and Integrity Checking