Cloud Foundry Diego, release versions prior to 2.8.0, does not properly sanitize file paths in tar and zip files headers. A remote attacker with CF admin privileges can upload a malicious buildpack that will allow a complete takeover of a Diego Cell VM and access to all apps running on that Diego Cell.
References
Link | Resource |
---|---|
https://www.cloudfoundry.org/blog/cve-2018-1265/ | Third Party Advisory |
https://www.cloudfoundry.org/blog/cve-2018-1265/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cloudfoundry.org/blog/cve-2018-1265/ - Third Party Advisory |
Information
Published : 2018-06-06 20:29
Updated : 2024-11-21 03:59
NVD link : CVE-2018-1265
Mitre link : CVE-2018-1265
CVE.ORG link : CVE-2018-1265
JSON object : View
Products Affected
pivotal_software
- cloud_foundry_diego
cloudfoundry
- cf-deployment
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type