Description
Pivotal Application Manager, versions 666.0.x prior to 666.0.36, versions 667.0.x prior to 667.0.22, versions 668.0.x prior to 668.0.21, versions 669.0.x prior to 669.0.13, and versions 670.0.x prior to 670.0.7, contain a vulnerability where a remote authenticated user can create an app with a name such that a csv program can interpret into a formula and gets executed. The malicious user can possibly gain access to a usage report that requires a higher privilege.
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
- Attack Vector
- network
- Complexity
- low
- Privileges
- low
- User Action
- none
- Scope
- unchanged
- Confidentiality
- low
- Integrity
- none
- Availability
- none
- Weaknesses
- CWE-74CWE-1236
Metadata
- Primary Vendor
- PIVOTAL
- Published
- 10/1/2019
- Last Modified
- 11/21/2024
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
pivotal : apps_managerpivotal : apps_managerpivotal : apps_managerpivotal : apps_managerpivotal : apps_managerpivotal_software : pivotal_application_servicepivotal_software : pivotal_application_servicepivotal_software : pivotal_application_servicepivotal_software : pivotal_application_service
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.