First published: Fri Dec 23 2016(Updated: )
Cloud Foundry before 248; UAA 2.x before 2.7.4.12, 3.x before 3.6.5, and 3.7.x through 3.9.x before 3.9.3; and UAA bosh release (aka uaa-release) before 13.9 for UAA 3.6.5 and before 24 for UAA 3.9.3 allow attackers to gain privileges by accessing UAA logs and subsequently running a specially crafted application that interacts with a configured SAML provider.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloud Foundry UAA | <=23.0 | |
Cloud Foundry | <=247.0 | |
Cloud Foundry User Account and Authentication (UAA) | <=3.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6659 is considered to have a medium severity due to potential privilege escalation vulnerabilities.
To fix CVE-2016-6659, update to the latest release of Cloud Foundry UAA or Pivotal Cloud Foundry that is not susceptible to this vulnerability.
CVE-2016-6659 affects users of Cloud Foundry versions before 248 and UAA versions before 3.9.3.
The risks include unauthorized access to sensitive data and privileges if an attacker exploits the logged information.
As of my last update, there were no confirmed reports of active exploitation of CVE-2016-6659, but it's still advisable to apply the necessary updates.