1 results (0.001 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Cloud Foundry Log Cache, versions prior to 1.1.1, logs its UAA client secret on startup as part of its envstruct report. A remote attacker who has gained access to the Log Cache VM can read this secret, gaining all privileges held by the Log Cache UAA client. In the worst case, if this client is an admin, the attacker would gain complete control over the Foundation. Cloud Foundry Log Cache, en versiones anteriores a la 1.1.1, registra el secreto UAA del cliente al arranque como parte de su informe envstruct. Un atacante remoto que ha obtenido acceso a la máquina virtual Log Cache puede leer este secreto, obteniendo todos los privilegios obtenidos por el cliente UAA Log Cache. • https://www.cloudfoundry.org/blog/cve-2018-1264 • CWE-532: Insertion of Sensitive Information into Log File •