// For flags

CVE-2017-4970

 

Severity Score

5.9
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in Cloud Foundry Foundation cf-release v255 and Staticfile buildpack versions v1.4.0 - v1.4.3. A regression introduced in the Static file build pack causes the Staticfile.auth configuration to be ignored when the Static file file is not present in the application root. Applications containing a Staticfile.auth file but not a Static file had their basic auth turned off when an operator upgraded the Static file build pack in the foundation to one of the vulnerable versions. Note that Static file applications without a Static file are technically misconfigured, and will not successfully detect unless the Static file build pack is explicitly specified.

Se detectó un problema en cf-release versión v255 y Staticfile buildpack versiones v1.4.0 hasta v1.4.3 de Cloud Foundry Foundation. Una regresión introducida en el paquete de compilación de archivos Static hace que la configuración de Staticfile.auth sea ignorada cuando el archivo Static file no esté presente en la aplicación root. Las aplicaciones que contienen un archivo Staticfile.auth pero no un archivo Static tuvieron su identificación básica desactivada cuando un operador actualizó el paquete de compilación de archivos Static en la fundación de una de las versiones vulnerables. Tomar en cuenta que las aplicaciones de archivos Static sin un archivo Static están mal configuradas técnicamente y no se detectarán con éxito a menos que el paquete de compilación de archivos Static sea especificada explícitamente.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-12-29 CVE Reserved
  • 2017-06-13 CVE Published
  • 2024-02-24 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (1)
URL Tag Source
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cloudfoundry
Search vendor "Cloudfoundry"
Cf-release
Search vendor "Cloudfoundry" for product "Cf-release"
255
Search vendor "Cloudfoundry" for product "Cf-release" and version "255"
-
Affected
Cloudfoundry
Search vendor "Cloudfoundry"
Staticfile Buildpack
Search vendor "Cloudfoundry" for product "Staticfile Buildpack"
1.4.0
Search vendor "Cloudfoundry" for product "Staticfile Buildpack" and version "1.4.0"
-
Affected
Cloudfoundry
Search vendor "Cloudfoundry"
Staticfile Buildpack
Search vendor "Cloudfoundry" for product "Staticfile Buildpack"
1.4.1
Search vendor "Cloudfoundry" for product "Staticfile Buildpack" and version "1.4.1"
-
Affected
Cloudfoundry
Search vendor "Cloudfoundry"
Staticfile Buildpack
Search vendor "Cloudfoundry" for product "Staticfile Buildpack"
1.4.2
Search vendor "Cloudfoundry" for product "Staticfile Buildpack" and version "1.4.2"
-
Affected
Cloudfoundry
Search vendor "Cloudfoundry"
Staticfile Buildpack
Search vendor "Cloudfoundry" for product "Staticfile Buildpack"
1.4.3
Search vendor "Cloudfoundry" for product "Staticfile Buildpack" and version "1.4.3"
-
Affected