The password change functionality in Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire existing sessions.
According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”
Name | Vendor | Start Version | End Version |
---|---|---|---|
Cf-release | Cloudfoundry | * | 216 (excluding) |
Cloud_foundry_elastic_runtime | Pivotal_software | * | 1.7.0 (excluding) |
Cloud_foundry_uaa | Pivotal_software | * | 2.5.2 (excluding) |