Описание
The UAA reset password flow in Cloud Foundry release v236 and earlier versions, UAA release v3.3.0 and earlier versions, all versions of Login-server, UAA release v10 and earlier versions and Pivotal Elastic Runtime versions prior to 1.7.2 is vulnerable to a brute force attack due to multiple active codes at a given time. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 10 (включая)Версия до 236 (включая)Версия до 1.7.1 (включая)Версия до 3.3.0 (включая)
Одно из
cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:*:*:*:*:*:*:*:*
cpe:2.3:a:pivotal_software:cloud_foundry:*:*:*:*:*:*:*:*
cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:*:*:*:*:*:*:*:*
cpe:2.3:a:pivotal_software:cloud_foundry_uaa:*:*:*:*:*:*:*:*
cpe:2.3:a:pivotal_software:login-server:-:*:*:*:*:*:*:*
EPSS
Процентиль: 56%
0.00338
Низкий
8.1 High
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-264
Связанные уязвимости
CVSS3: 8.1
github
больше 3 лет назад
Cloud Foundry UAA reset password vulnerable to brute force attack
EPSS
Процентиль: 56%
0.00338
Низкий
8.1 High
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-264