Cloud Foundry CAPI (Cloud Controller), versions prior to 1.97.0, when used in a deployment where an app domain is also the system domain (which is true in the default CF Deployment manifest), were vulnerable to developers maliciously or accidentally claiming certain sensitive routes, potentially resulting in the developer's app handling some requests that were expected to go to certain system components.
References
Link | Resource |
---|---|
https://www.cloudfoundry.org/blog/cve-2020-5417 | Vendor Advisory |
https://www.cloudfoundry.org/blog/cve-2020-5417 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cloudfoundry.org/blog/cve-2020-5417 - Vendor Advisory |
Information
Published : 2020-08-21 22:15
Updated : 2024-11-21 05:34
NVD link : CVE-2020-5417
Mitre link : CVE-2020-5417
CVE.ORG link : CVE-2020-5417
JSON object : View
Products Affected
cloudfoundry
- cf-deployment
- capi-release
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource