First published: Sun Sep 18 2016(Updated: )
Pivotal Cloud Foundry (PCF) Ops Manager before 1.5.14 and 1.6.x before 1.6.9 uses the same cookie-encryption key across different customers' installations, which allows remote attackers to bypass session authentication by leveraging knowledge of this key from another installation.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pivotal Operations Manager | <=1.5.13 | |
Pivotal Operations Manager | =1.6.0 | |
Pivotal Operations Manager | =1.6.1 | |
Pivotal Operations Manager | =1.6.2 | |
Pivotal Operations Manager | =1.6.3 | |
Pivotal Operations Manager | =1.6.4 | |
Pivotal Operations Manager | =1.6.5 | |
Pivotal Operations Manager | =1.6.6 | |
Pivotal Operations Manager | =1.6.7 | |
Pivotal Operations Manager | =1.6.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0883 is considered a medium severity vulnerability due to its potential for session authentication bypass.
To fix CVE-2016-0883, upgrade Pivotal Cloud Foundry Ops Manager to version 1.5.14 or higher, or 1.6.9 or higher.
CVE-2016-0883 affects Pivotal Cloud Foundry Ops Manager versions 1.5.13 and earlier, and 1.6.0 to 1.6.8.
The impact of CVE-2016-0883 is that it allows remote attackers to bypass session authentication if they have knowledge of the shared cookie-encryption key.
Organizations using affected versions of Pivotal Cloud Foundry Ops Manager should be concerned about CVE-2016-0883 due to its security implications.