First published: Fri Jan 06 2017(Updated: )
An issue was discovered in Pivotal GemFire for PCF 1.6.x versions prior to 1.6.5 and 1.7.x versions prior to 1.7.1. The gfsh (Geode Shell) endpoint, used by operators and application developers to connect to their cluster, is unauthenticated and publicly accessible. Because HTTPS communications are terminated at the gorouter, communications from the gorouter to GemFire clusters are unencrypted. An attacker could run any command available on gfsh and could cause denial of service, lost confidentiality of data, escalate privileges, or eavesdrop on other communications between the gorouter and the cluster.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pivotal Software Gemfire For Pivotal Cloud Foundry | =1.6.0.0 | |
Pivotal Software Gemfire For Pivotal Cloud Foundry | =1.6.1 | |
Pivotal Software Gemfire For Pivotal Cloud Foundry | =1.6.2 | |
Pivotal Software Gemfire For Pivotal Cloud Foundry | =1.6.3.0 | |
Pivotal Software Gemfire For Pivotal Cloud Foundry | =1.6.4.0 | |
Pivotal Software Gemfire For Pivotal Cloud Foundry | =1.7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-9885 is rated as high due to its unauthenticated access to the GFSH endpoint.
To fix CVE-2016-9885, upgrade to Pivotal GemFire for PCF version 1.6.5 or 1.7.1 or later.
CVE-2016-9885 affects Pivotal GemFire versions 1.6.0.0 through 1.6.4.0 and 1.7.0.0.
CVE-2016-9885 allows unauthorized access to the GFSH endpoint, potentially exposing the cluster to malicious activities.
There are no official workarounds for CVE-2016-9885; upgrading to a patched version is recommended.