HomeCloudfoundryCVE-2019-3798

CVE-2019-3798

MEDIUM
6.0CVSS
Published: 2019-04-17
Updated: 2024-11-21
AI Analysis

Description

Cloud Foundry Cloud Controller API Release, versions prior to 1.79.0, contains improper authentication when validating user permissions. A remote authenticated malicious user with the ability to create UAA clients and knowledge of the email of a victim in the foundation may escalate their privileges to that of the victim by creating a client with a name equal to the guid of their victim.

CVSS Metrics

Vector
CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H
Attack Vector
network
Complexity
high
Privileges
high
User Action
required
Scope
unchanged
Confidentiality
low
Integrity
high
Availability
high
Weaknesses
CWE-287CWE-287

Metadata

Primary Vendor
CLOUDFOUNDRY
Published
4/17/2019
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

cloudfoundry : capi-release

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2019-3798 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com