Lucene search

K
CloudfoundryUser Account And Authentication

5 matches found

CVE
CVE
added 2019/12/06 8:15 p.m.143 views

CVE-2019-11293

Cloud Foundry UAA Release, versions prior to v74.10.0, when set to logging level DEBUG, logs client_secret credentials when sent as a query parameter. A remote authenticated malicious user could gain access to user credentials via the uaa.log file if authentication is provided via query parameters.

8.8CVSS6.8AI score0.00567EPSS
CVE
CVE
added 2019/09/26 9:15 p.m.110 views

CVE-2019-11278

CF UAA versions prior to 74.1.0, allow external input to be directly queried against. A remote malicious user with 'client.write' and 'groups.update' can craft a SCIM query, which leaks information that allows an escalation of privileges, ultimately allowing the malicious user to gain control of UA...

8.8CVSS9AI score0.00445EPSS
CVE
CVE
added 2019/11/26 12:15 a.m.70 views

CVE-2019-11290

Cloud Foundry UAA Release, versions prior to v74.8.0, logs all query parameters to tomcat’s access file. If the query parameters are used to provide authentication, ie. credentials, then they will be logged as well.

8.8CVSS7.6AI score0.00459EPSS
CVE
CVE
added 2017/09/07 1:29 p.m.52 views

CVE-2016-0732

The identity zones feature in Pivotal Cloud Foundry 208 through 229; UAA 2.0.0 through 2.7.3 and 3.0.0; UAA-Release 2 through 4, when configured with multiple identity zones; and Elastic Runtime 1.6.0 through 1.6.13 allows remote authenticated users with privileges in one zone to gain privileges an...

8.8CVSS8.5AI score0.00414EPSS
CVE
CVE
added 2020/02/27 8:15 p.m.40 views

CVE-2020-5402

In Cloud Foundry UAA, versions prior to 74.14.0, a CSRF vulnerability exists due to the OAuth2 state parameter not being checked in the callback function when authenticating with external identity providers.

8.8CVSS8.6AI score0.0021EPSS