Authentication hijack in Cloud Foundry Foundation products - CVE-2016-6637

 

Authentication hijack in Cloud Foundry Foundation products - CVE-2016-6637

Published: September 30, 2016 / Updated: October 3, 2016


Vulnerability identifier: #VU712
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2016-6637
CWE-ID: CWE-352
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Cloud Foundry Foundation
Affected software:
Pivotal Cloud Foundry Ops Manager
Pivotal Cloud Foundry Elastic Runtime
Cloud Foundry UAA
Bosh Release for the UAA

Detailed vulnerability description

The vulnerability allows a remote user hijack valid user's authentication on the target language.
The weakness exists due to cross-site request forgery and allows attacker to steal user's authentication data.
Successful exploitation of the vulnerability may result in using victim's authentication for approval/denial a scope via a profile or approval page authorization.

How to mitigate CVE-2016-6637

Update Pivotal Cloud Foundry (PCF) UAA 2.x to 2.7.4.7, 3.x to 3.3.0.5, and 3.4.x to 3.4.4.
Update Pivotal Cloud Foundry (PCF) UAA BOSH 11.5 and 12.x to 12.5.
Update Pivotal Cloud Foundry (PCF) Elastic Runtime 1.7.x to 1.7.21, and 1.8.x to 1.8.2.
Update Pivotal Cloud Foundry (PCF) Ops Manager 1.7.x to 1.7.13 and 1.8.x to 1.8.1.

Sources