First published: Tue Jun 13 2017(Updated: )
An issue was discovered in Cloud Foundry Foundation BOSH Release 261.x versions prior to 261.3 and all 260.x versions. In certain cases an authenticated Director user can provide a malicious checksum that could allow them to escalate their privileges on the Director VM, aka "BOSH Director Shell Injection Vulnerabilities."
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloud Foundry BOSH | =260 | |
Cloud Foundry BOSH | =260.1 | |
Cloud Foundry BOSH | =260.2 | |
Cloud Foundry BOSH | =260.3 | |
Cloud Foundry BOSH | =260.4 | |
Cloud Foundry BOSH | =260.5 | |
Cloud Foundry BOSH | =260.6 | |
Cloud Foundry BOSH | =260.7 | |
Cloud Foundry BOSH | =261 | |
Cloud Foundry BOSH | =261.1 | |
Cloud Foundry BOSH | =261.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-4961 is considered a high-severity vulnerability due to its potential for privilege escalation.
To fix CVE-2017-4961, upgrade to BOSH Release 261.3 or later versions.
CVE-2017-4961 affects all 260.x versions and BOSH Release 261.x versions prior to 261.3.
The impact of CVE-2017-4961 allows authenticated users to escalate their privileges on the Director VM.
Authenticated Director users of affected Cloud Foundry BOSH versions are at risk from CVE-2017-4961.