// For flags

CVE-2019-11276

Apps Manager sends tokens to Spring apps via HTTP

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Pivotal Apps Manager, included in Pivotal Application Service versions 2.3.x prior to 2.3.16, 2.4.x prior to 2.4.12, 2.5.x prior to 2.5.8, and 2.6.x prior to 2.6.3, makes a request to the /cloudapplication endpoint via Spring actuator, and subsequent requests via unsecured http. An adjacent unauthenticated user could eavesdrop on the network traffic and gain access to the unencrypted token allowing the attacker to read the type of access a user has over an app. They may also modify the logging level, potentially leading to lost information that would otherwise have been logged.

Pivotal Apps Manager, incluido en Pivotal Application Service versiones 2.3.x anteriores a 2.3.16, versiones 2.4.x anteriores a 2.4.12, versiones 2.5.x anteriores a 2.5.8, y versiones 2.6.x anteriores a 2.6.3, realiza una petición al endpoint /cloudapplication por medio del actuador Spring, y las peticiones subsiguientes por medio de http no asegurado. Un usuario no autenticado adyacente podría detectar el tráfico de la red y conseguir acceso al token no cifrado que permite al atacante leer el tipo de acceso que presenta un usuario por medio de una aplicación. También pueden modificar el nivel de registro, lo que podría conllevar a la pérdida de información que de otra manera se habría registrado.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-04-18 CVE Reserved
  • 2019-08-19 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-319: Cleartext Transmission of Sensitive Information
CAPEC
References (1)
URL Tag Source
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Pivotal Software
Search vendor "Pivotal Software"
Application Service
Search vendor "Pivotal Software" for product "Application Service"
>= 2.3.0 < 2.3.16
Search vendor "Pivotal Software" for product "Application Service" and version " >= 2.3.0 < 2.3.16"
-
Affected
Pivotal Software
Search vendor "Pivotal Software"
Application Service
Search vendor "Pivotal Software" for product "Application Service"
>= 2.4.0 < 2.4.12
Search vendor "Pivotal Software" for product "Application Service" and version " >= 2.4.0 < 2.4.12"
-
Affected
Pivotal Software
Search vendor "Pivotal Software"
Application Service
Search vendor "Pivotal Software" for product "Application Service"
>= 2.5.0 < 2.5.8
Search vendor "Pivotal Software" for product "Application Service" and version " >= 2.5.0 < 2.5.8"
-
Affected
Pivotal Software
Search vendor "Pivotal Software"
Application Service
Search vendor "Pivotal Software" for product "Application Service"
>= 2.6.0 < 2.6.3
Search vendor "Pivotal Software" for product "Application Service" and version " >= 2.6.0 < 2.6.3"
-
Affected