← Back to CVEs
CVE-2018-1195
HIGH8.8
Description
In Cloud Controller versions prior to 1.46.0, cf-deployment versions prior to 1.3.0, and cf-release versions prior to 283, Cloud Controller accepts refresh tokens for authentication where access tokens are expected. This exposes a vulnerability where a refresh token that would otherwise be insufficient to obtain an access token, either due to lack of client credentials or revocation, would allow authentication.
CVE Details
CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published3/19/2018
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
cloudfoundry:capi-releasecloudfoundry:cf-deploymentcloudfoundry:cf-release
Weaknesses (CWE)
CWE-613
References
https://www.cloudfoundry.org/blog/cve-2018-1195/(security_alert@emc.com)
https://www.cloudfoundry.org/blog/cve-2018-1195/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.