CVE Vulnerabilities

CVE-2017-8034

Reliance on Cookies without Validation and Integrity Checking

Published: Jul 17, 2017 | Modified: Oct 03, 2019
CVSS 3.x
6.6
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6 MEDIUM
AV:N/AC:M/Au:S/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

The Cloud Controller and Router in Cloud Foundry (CAPI-release capi versions prior to v1.32.0, Routing-release versions prior to v0.159.0, CF-release versions prior to v267) do not validate the issuer on JSON Web Tokens (JWTs) from UAA. With certain multi-zone UAA configurations, zone administrators are able to escalate their privileges.

Weakness

The product relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid for the associated user.

Affected Software

Name Vendor Start Version End Version
Capi-release Cloudfoundry * 1.31.0 (including)
Cf-release Cloudfoundry * 266 (including)
Routing-release Cloudfoundry * 0.158.0 (including)

Potential Mitigations

References