CVE Vulnerabilities

CVE-2015-5171

Insufficient Session Expiration

Published: Oct 24, 2017 | Modified: Aug 25, 2021
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

The password change functionality in Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire existing sessions.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

Name Vendor Start Version End Version
Cf-release Cloudfoundry * 216 (excluding)
Cloud_foundry_elastic_runtime Pivotal_software * 1.7.0 (excluding)
Cloud_foundry_uaa Pivotal_software * 2.5.2 (excluding)

Potential Mitigations

References