CVE-2015-5350
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In Garden versions 0.22.0-0.329.0, a vulnerability has been discovered in the garden-linux nstar executable that allows access to files on the host system. By staging an application on Cloud Foundry using Diego and Garden installations with a malicious custom buildpack an end user could read files on the host system that the BOSH-created vcap user has permissions to read and then package them into their app droplet.
De las versiones 0.22.0-0.329.0 de Garden, se ha descubierto una vulnerabilidad en el ejecutable nstar de garden-linux que permite el acceso a archivos en el sistema host. Al almacenar provisionalmente una aplicación en Cloud Foundry empleando las instalaciones Diego y Garden con un buildpack personalizado malicioso, un usuario final podría leer archivos en el sistema host que el usuario vcap creado por BOSH tiene permisos para leer y, a continuación, empaquetarlos en su aplicación droplet.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-07-01 CVE Reserved
- 2018-03-19 CVE Published
- 2024-09-16 CVE Updated
- 2024-11-29 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-284: Improper Access Control
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://pivotal.io/security/cve-2015-5350 | 2018-04-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cloudfoundry Search vendor "Cloudfoundry" | Garden Search vendor "Cloudfoundry" for product "Garden" | < 0.330.0 Search vendor "Cloudfoundry" for product "Garden" and version " < 0.330.0" | - |
Affected
|