First published: Tue Oct 24 2017(Updated: )
Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact via vectors involving emails with password recovery links, aka "Cross Domain Referer Leakage."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloud Foundry CF Release | <216 | |
Pivotal Cloud Foundry Elastic Runtime | <1.7.0 | |
Cloud Foundry User Account and Authentication (UAA) | <2.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5173 is classified as a medium severity vulnerability.
To fix CVE-2015-5173, upgrade to Cloud Foundry Runtime cf-release version 216 or later, UAA version 2.5.2 or later, or Pivotal Cloud Foundry Elastic Runtime version 1.7.0 or later.
The impact of CVE-2015-5173 allows attackers to exploit unspecified vectors involving emails with password recovery links.
Versions affected by CVE-2015-5173 include cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry Elastic Runtime before 1.7.0.
Organizations using the affected versions of Cloud Foundry runtime components should be concerned about CVE-2015-5173.