First published: Tue Oct 24 2017(Updated: )
Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire password reset links.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.cloudfoundry.identity:cloudfoundry-identity-server | <2.5.2 | 2.5.2 |
Cloud Foundry CF Release | <216 | |
Pivotal Cloud Foundry Elastic Runtime | <1.7.0 | |
Cloud Foundry User Account and Authentication (UAA) | <2.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5172 has a moderate severity rating due to the potential exploitation of non-expired password reset links.
To fix CVE-2015-5172, upgrade Cloud Foundry UAA to version 2.5.2 or later, CF Release to 216 or later, and PCF Elastic Runtime to 1.7.0 or later.
CVE-2015-5172 affects Cloud Foundry UAA versions prior to 2.5.2, CF Release versions prior to 216, and Pivotal Cloud Foundry Elastic Runtime versions prior to 1.7.0.
CVE-2015-5172 can allow attackers to exploit the system by leveraging unexpired password reset links.
CVE-2015-5172 was disclosed in 2015 as part of a security advisory for vulnerabilities in Cloud Foundry.