CVE-2018-1264
Log Cache logs UAA client secret on startup
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Cloud Foundry Log Cache, versions prior to 1.1.1, logs its UAA client secret on startup as part of its envstruct report. A remote attacker who has gained access to the Log Cache VM can read this secret, gaining all privileges held by the Log Cache UAA client. In the worst case, if this client is an admin, the attacker would gain complete control over the Foundation.
Cloud Foundry Log Cache, en versiones anteriores a la 1.1.1, registra el secreto UAA del cliente al arranque como parte de su informe envstruct. Un atacante remoto que ha obtenido acceso a la máquina virtual Log Cache puede leer este secreto, obteniendo todos los privilegios obtenidos por el cliente UAA Log Cache. En el peor de los casos, si este cliente es un administrador, el atacante obtendrÃa el control total de Foundation.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-12-06 CVE Reserved
- 2018-10-05 CVE Published
- 2024-07-12 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-532: Insertion of Sensitive Information into Log File
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.cloudfoundry.org/blog/cve-2018-1264 | 2019-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Pivotal Software Search vendor "Pivotal Software" | Cloud Foundry Log Cache Search vendor "Pivotal Software" for product "Cloud Foundry Log Cache" | < 1.1.1 Search vendor "Pivotal Software" for product "Cloud Foundry Log Cache" and version " < 1.1.1" | - |
Affected
|