Lucene search

K
cve[email protected]CVE-2016-8218
HistoryJun 13, 2017 - 6:29 a.m.

CVE-2016-8218

2017-06-1306:29:00
CWE-20
web.nvd.nist.gov
16
cve-2016-8218
cloud foundry foundation
routing-release
cf-release
json web token
jwt
security vulnerability
nvd
cve

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

61.2%

An issue was discovered in Cloud Foundry Foundation routing-release versions prior to 0.142.0 and cf-release versions 203 to 231. Incomplete validation logic in JSON Web Token (JWT) libraries can allow unprivileged attackers to impersonate other users to the routing API, aka an “Unauthenticated JWT signing algorithm in routing” issue.

Affected configurations

NVD
Node
cloudfoundrycf-releaseRange203
OR
cloudfoundrycf-releaseMatch204
OR
cloudfoundrycf-releaseMatch205
OR
cloudfoundrycf-releaseMatch206
OR
cloudfoundrycf-releaseMatch207
OR
cloudfoundrycf-releaseMatch208
OR
cloudfoundrycf-releaseMatch209
OR
cloudfoundrycf-releaseMatch210
OR
cloudfoundrycf-releaseMatch211
OR
cloudfoundrycf-releaseMatch212
OR
cloudfoundrycf-releaseMatch213
OR
cloudfoundrycf-releaseMatch214
OR
cloudfoundrycf-releaseMatch215
OR
cloudfoundrycf-releaseMatch217
OR
cloudfoundrycf-releaseMatch218
OR
cloudfoundrycf-releaseMatch219
OR
cloudfoundrycf-releaseMatch220
OR
cloudfoundrycf-releaseMatch221
OR
cloudfoundrycf-releaseMatch222
OR
cloudfoundrycf-releaseMatch223
OR
cloudfoundrycf-releaseMatch224
OR
cloudfoundrycf-releaseMatch225
OR
cloudfoundrycf-releaseMatch226
OR
cloudfoundrycf-releaseMatch227
OR
cloudfoundrycf-releaseMatch228
OR
cloudfoundrycf-releaseMatch229
OR
cloudfoundrycf-releaseMatch230
OR
cloudfoundrycf-releaseMatch231
OR
cloudfoundryrouting-releaseRange0.141.0

CNA Affected

[
  {
    "product": "Cloud Foundry",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Cloud Foundry"
      }
    ]
  }
]

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

61.2%

Related for CVE-2016-8218