First published: Thu May 25 2017(Updated: )
With Cloud Foundry Runtime cf-release versions v209 or earlier, UAA Standalone versions 2.2.6 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier the UAA logout link is susceptible to an open redirect which allows an attacker to insert malicious web page as a redirect parameter.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloud Foundry CF Release | <=209 | |
Pivotal Cloud Foundry Elastic Runtime | <=1.4.5 | |
Cloud Foundry User Account and Authentication (UAA) | <=2.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3190 is classified as a medium severity vulnerability due to the potential for an open redirect attack.
The fix for CVE-2015-3190 involves updating to Cloud Foundry Runtime cf-release version v210 or later, UAA Standalone version 2.2.7 or later, or Pivotal Cloud Foundry Runtime version 1.4.6 or later.
CVE-2015-3190 enables attackers to exploit the UAA logout link for open redirect attacks, potentially leading users to malicious web pages.
CVE-2015-3190 affects Cloud Foundry Runtime cf-release versions up to v209, UAA Standalone versions up to 2.2.6, and Pivotal Cloud Foundry Runtime versions up to 1.4.5.
While CVE-2015-3190 primarily enables redirection attacks, it can indirectly risk user data if users are tricked into providing sensitive information on a malicious site.