Cloud Foundry Log Cache, versions prior to 1.1.1, logs its UAA client secret on startup as part of its envstruct report. A remote attacker who has gained access to the Log Cache VM can read this secret, gaining all privileges held by the Log Cache UAA client. In the worst case, if this client is an admin, the attacker would gain complete control over the Foundation.
References
Link | Resource |
---|---|
https://www.cloudfoundry.org/blog/cve-2018-1264/ | Vendor Advisory |
https://www.cloudfoundry.org/blog/cve-2018-1264/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cloudfoundry.org/blog/cve-2018-1264/ - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 9.1 |
Information
Published : 2018-10-05 21:29
Updated : 2024-11-21 03:59
NVD link : CVE-2018-1264
Mitre link : CVE-2018-1264
CVE.ORG link : CVE-2018-1264
JSON object : View
Products Affected
pivotal_software
- cloud_foundry_log_cache
CWE
CWE-532
Insertion of Sensitive Information into Log File