CVE-2020-5417

Cloud Foundry CAPI (Cloud Controller), versions prior to 1.97.0, when used in a deployment where an app domain is also the system domain (which is true in the default CF Deployment manifest), were vulnerable to developers maliciously or accidentally claiming certain sensitive routes, potentially resulting in the developer's app handling some requests that were expected to go to certain system components.
References
Link Resource
https://www.cloudfoundry.org/blog/cve-2020-5417 Vendor Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*
cpe:2.3:a:cloudfoundry:capi-release:*:*:*:*:*:*:*:*

Information

Published : 2020-08-21 15:15

Updated : 2021-08-17 08:30


NVD link : CVE-2020-5417

Mitre link : CVE-2020-5417


JSON object : View

CWE
CWE-732

Incorrect Permission Assignment for Critical Resource

Advertisement

dedicated server usa

Products Affected

cloudfoundry

  • cf-deployment
  • capi-release