Loading
Generated remediation guidance and an executive summary. No account required.
Cloud Foundry Stratos, versions prior to 2.3.0, contains an insecure session that can be spoofed. When deployed on cloud foundry with multiple instances using the default embedded SQLite database, a remote authenticated malicious user can switch sessions to another user with the same session id.
Use CWE-384, Cloudfoundry vendor hub and Stratos product page to widen CVE-2019-3784 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2019-3783 for nearby disclosures in the same product family.