|
CVE-2018-1221: Gorouter websocket handling vulnerability
Hello all, We have identified a critical-severity issue with Routing. This issue has been assigned CVE-2018-1221. The public notice can be found here: https://www.cloudfoundry.org/blog/cve-2018-1221/
Hello all, We have identified a critical-severity issue with Routing. This issue has been assigned CVE-2018-1221. The public notice can be found here: https://www.cloudfoundry.org/blog/cve-2018-1221/
|
By
Molly Crowther
· #7729
·
|
|
Change in CF Security RSS Feed
Hello all, A few weeks ago, the foundation did some re-architecting of the CF blog to improve SEO and searchability. These updates changed the location of the Security RSS feed. If you are using this
Hello all, A few weeks ago, the foundation did some re-architecting of the CF blog to improve SEO and searchability. These updates changed the location of the Security RSS feed. If you are using this
|
By
Molly Crowther
· #7710
·
|
|
CVE-2017-14389: Application Subdomain Takeover via Cloud Foundry Private Domains
Hello all, We have identified high-severity issue with Cloud Controller. This issue has been assigned CVE-2017-14389. It was responsibly reported by the GE Digital Security Team. A Cloud Foundry user
Hello all, We have identified high-severity issue with Cloud Controller. This issue has been assigned CVE-2017-14389. It was responsibly reported by the GE Digital Security Team. A Cloud Foundry user
|
By
Molly Crowther
· #7554
·
|
|
CVE-2017-14388: GrootFS doesn't validate DiffIDs
FYI - You are only vulnerable to this if you are using GrootFS and are enabling developers to push docker containers to the platform. You need developer privileges to exploit. Molly
FYI - You are only vulnerable to this if you are using GrootFS and are enabling developers to push docker containers to the platform. You need developer privileges to exploit. Molly
|
By
Molly Crowther
· #7508
·
|
|
CVE-2017-14388: GrootFS doesn't validate DiffIDs
Apologies for posting this late but wanted it out before Friday morning (pacific time) for Europe folks. The fix is already committed so I didn't want to wait until Monday. https://www.cloudfoundry.or
Apologies for posting this late but wanted it out before Friday morning (pacific time) for Europe folks. The fix is already committed so I didn't want to wait until Monday. https://www.cloudfoundry.or
|
By
Molly Crowther
· #7507
·
|
|
Information about 3 CAPI CVEs
Hello all - Please see below for more information on 3 CAPI CVEs made public today. Please reply if you have any questions. Thanks, Molly Crowther CFF Security Team CVE-2017-8033: Cloud Controller API
Hello all - Please see below for more information on 3 CAPI CVEs made public today. Please reply if you have any questions. Thanks, Molly Crowther CFF Security Team CVE-2017-8033: Cloud Controller API
|
By
Molly Crowther
· #7061
·
|
|
CVE-2017-8032: UAA Identity Zone Admin Privilege Escalation
Please see below for information regarding a high CVE in UAA. Please pay extra attention to the Mitigation section to determine if your foundation is affected AND workaround information that you can p
Please see below for information regarding a high CVE in UAA. Please pay extra attention to the Mitigation section to determine if your foundation is affected AND workaround information that you can p
|
By
Molly Crowther
· #6926
·
|
|
CONFIDENTIAL / ACTION REQUIRED - CVE-2017-4992: Privilege escalation with user invitations
Hello - It's been brought to my attention that the messaging was confusing on this one as we originally included more information when we went public with the notice for CVE-2017-4992 but eventually p
Hello - It's been brought to my attention that the messaging was confusing on this one as we originally included more information when we went public with the notice for CVE-2017-4992 but eventually p
|
By
Molly Crowther
· #6914
·
|
|
CVE-2017-4994: Forwarded Headers in UAA
Please see the following link regarding a high CVE in UAA. If you have any further questions about this CVE, please join the #security channel in the open source slack. https://www.cloudfoundry.org/cv
Please see the following link regarding a high CVE in UAA. If you have any further questions about this CVE, please join the #security channel in the open source slack. https://www.cloudfoundry.org/cv
|
By
Molly Crowther
· #6887
·
|
|
CVE-2017-4992: Privilege escalation with user invitations
Please see the following link for information on *critical* UAA CVE CVE-2017-4992: Privilege escalation with user invitations We tried to include more information this time about how to tell if you ar
Please see the following link for information on *critical* UAA CVE CVE-2017-4992: Privilege escalation with user invitations We tried to include more information this time about how to tell if you ar
|
By
Molly Crowther
· #6831
·
|
|
CVE-2017-4991: UAA allows password reset across zones
CF devs, Please see the following public link for information about a high CVE in UAA. *https://www.cloudfoundry.org/cve-2017-4991/ <https://www.cloudfoundry.org/cve-2017-4991/>* Friendly reminder tha
CF devs, Please see the following public link for information about a high CVE in UAA. *https://www.cloudfoundry.org/cve-2017-4991/ <https://www.cloudfoundry.org/cve-2017-4991/>* Friendly reminder tha
|
By
Molly Crowther
· #6828
·
|
|
CVE-2017-4974: Blind SQL Injection with privileged UAA endpoints
CF devs, Please see the following public link for information about a high CVE in UAA. This is continuation of work that was originally released as part of CVE-2017-4972 <https://www.cloudfoundry.org/
CF devs, Please see the following public link for information about a high CVE in UAA. This is continuation of work that was originally released as part of CVE-2017-4972 <https://www.cloudfoundry.org/
|
By
Molly Crowther
· #6760
·
|
|
CVE-2017-4961: BOSH Director Shell Injection Vulnerabilities
CF devs, Please see the following public link for information about a high CVE in bosh. https://www.cloudfoundry.org/cve-2017-4961/ Friendly reminder that you can subscribe to new Cloud Foundry securi
CF devs, Please see the following public link for information about a high CVE in bosh. https://www.cloudfoundry.org/cve-2017-4961/ Friendly reminder that you can subscribe to new Cloud Foundry securi
|
By
Molly Crowther
· #6759
·
|
|
CVE-2017-4973: Privilege Escalation in UAA
CF Devs, Please see information for the following high UAA CVE. This issue was fixed in the same releases as CVE-2017-4972 (the blind SQL injection) so if you already have plans to upgrade, you don't
CF Devs, Please see information for the following high UAA CVE. This issue was fixed in the same releases as CVE-2017-4972 (the blind SQL injection) so if you already have plans to upgrade, you don't
|
By
Molly Crowther
· #6714
·
|
|
CVE-2017-4972: Blind SQL Injection in UAA
CF devs, Please see the following public link for information about a high CVE in UAA. https://www.cloudfoundry.org/cve-2017-4972/ Friendly reminder that you can subscribe to new Cloud Foundry securit
CF devs, Please see the following public link for information about a high CVE in UAA. https://www.cloudfoundry.org/cve-2017-4972/ Friendly reminder that you can subscribe to new Cloud Foundry securit
|
By
Molly Crowther
· #6711
·
|
|
CVE-2017-4970: Static file buildpack ignores basic authentication when misconfigured
Please see the following CVE (also available at https://www.cloudfoundry.org/cve-2017-4970/). To always be up to date with OSS Cloud Foundry CVE notices, please check out the #security channel in the
Please see the following CVE (also available at https://www.cloudfoundry.org/cve-2017-4970/). To always be up to date with OSS Cloud Foundry CVE notices, please check out the #security channel in the
|
By
Molly Crowther
· #6679
·
|
|
CVE-2017-4964: BOSH Azure CPI code injection vulnerability
Please see the following *medium* security advisory and let us know if you have any questions or concerns. https://www.cloudfoundry.org/cve-2017-4964/ Thanks, Molly Crowther Cloud Foundry Foundation S
Please see the following *medium* security advisory and let us know if you have any questions or concerns. https://www.cloudfoundry.org/cve-2017-4964/ Thanks, Molly Crowther Cloud Foundry Foundation S
|
By
Molly Crowther
· #6638
·
|
|
[informational] CVE-2017-5638: Apache Struts Remote Code Execution
Please see the following advisory notice about the Apache Struts 2 remote code execution CVE (aka "strutshock" or "struts-shock"). The Cloud Foundry project itself does not appear to be vulnerable, bu
Please see the following advisory notice about the Apache Struts 2 remote code execution CVE (aka "strutshock" or "struts-shock"). The Cloud Foundry project itself does not appear to be vulnerable, bu
|
By
Molly Crowther
· #6517
·
|
|
CVE-2017-4960: UAA OAuth DOS via lockout feature
Please see the following notice for a high UAA CVE posted to cloudfoundry.org/security. Let us know if you have any questions or concerns. https://www.cloudfoundry.org/cve-2017-4960/ Thanks, Molly Cro
Please see the following notice for a high UAA CVE posted to cloudfoundry.org/security. Let us know if you have any questions or concerns. https://www.cloudfoundry.org/cve-2017-4960/ Thanks, Molly Cro
|
By
Molly Crowther
· #6494
·
|
|
Update to Garden RunC vulnerability notice
Hello - we originally thought we were not vulnerable to a vulnerability in RunC but turns out it is complicated. Please see updated notice below. https://www.cloudfoundry.org/cve-2016-9962/ Please let
Hello - we originally thought we were not vulnerable to a vulnerability in RunC but turns out it is complicated. Please see updated notice below. https://www.cloudfoundry.org/cve-2016-9962/ Please let
|
By
Molly Crowther
· #6295
·
|