Page 4 of 17 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered in the Cloud Controller API in Cloud Foundry Foundation CAPI-release versions after v1.6.0 and prior to v1.35.0 and cf-release versions after v244 and prior to v268. A carefully crafted CAPI request from a Space Developer can allow them to gain access to files on the Cloud Controller VM for that installation. Se ha descubierto en la API Cloud Controller en Cloud Foundry Foundation CAPI-release en versiones posteriores a 1.6.0 y anteriores a 1.35.0 y las versiones cf-release posteriores a v244 y anteriores a v268. Una petición CAPI especialmente manipulada desde un Space Developer puede permitir que atacantes obtengan acceso al Cloud Controller VM para tal instalación. • https://www.cloudfoundry.org/cve-2017-8035 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in the Cloud Controller API in Cloud Foundry Foundation CAPI-release version 1.33.0 (only). The original fix for CVE-2017-8033 included in CAPI-release 1.33.0 introduces a regression that allows a space developer to execute arbitrary code on the Cloud Controller VM by pushing a specially crafted application. Se ha descubierto un problema en la API Cloud Controller en Cloud Foundry Foundation CAPI-release 1.33.0. La solución original para CVE-2017-8033 en CAPI-release 1.33.0 introduce una regresión que permite que el desarrollador de espacio ejecute código arbitrario en Cloud Controller VM ejecutando una aplicación especialmente manipulada. • http://www.securityfocus.com/bid/100002 https://www.cloudfoundry.org/cve-2017-8036 •