Описание
CAPI (Cloud Controller) versions prior to 1.101.0 are vulnerable to a denial-of-service attack in which an unauthenticated malicious attacker can send specially-crafted YAML files to certain endpoints, causing the YAML parser to consume excessive CPU and RAM.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.101.0 (исключая)Версия до 15.0.0 (исключая)
Одно из
cpe:2.3:a:cloudfoundry:capi-release:*:*:*:*:*:*:*:*
cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*
EPSS
Процентиль: 62%
0.00421
Низкий
7.5 High
CVSS3
7.5 High
CVSS3
7.8 High
CVSS2
Дефекты
CWE-400
CWE-400
Связанные уязвимости
github
больше 3 лет назад
CAPI (Cloud Controller) versions prior to 1.101.0 are vulnerable to a denial-of-service attack in which an unauthenticated malicious attacker can send specially-crafted YAML files to certain endpoints, causing the YAML parser to consume excessive CPU and RAM.
EPSS
Процентиль: 62%
0.00421
Низкий
7.5 High
CVSS3
7.5 High
CVSS3
7.8 High
CVSS2
Дефекты
CWE-400
CWE-400