First published: Tue Oct 24 2017(Updated: )
The password change functionality in Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire existing sessions.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.cloudfoundry.identity:cloudfoundry-identity-server | <2.5.2 | 2.5.2 |
Cloud Foundry CF Release | <216 | |
Pivotal Elastic Runtime | <1.7.0 | |
Pivotal UAA | <2.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5171 is classified as a moderate severity vulnerability.
To fix CVE-2015-5171, update Cloud Foundry Runtime to cf-release version 216 or higher, UAA to version 2.5.2 or higher, or Pivotal Cloud Foundry Elastic Runtime to version 1.7.0 or higher.
CVE-2015-5171 affects Cloud Foundry Runtime cf-release versions before 216, UAA versions before 2.5.2, and Pivotal Cloud Foundry Elastic Runtime versions before 1.7.0.
Mitigation of CVE-2015-5171 requires ensuring all components are updated and reviewing session management policies.