First published: Tue Jun 13 2017(Updated: )
An issue was discovered in Cloud Foundry Foundation cf-release v255 and Staticfile buildpack versions v1.4.0 - v1.4.3. A regression introduced in the Static file build pack causes the Staticfile.auth configuration to be ignored when the Static file file is not present in the application root. Applications containing a Staticfile.auth file but not a Static file had their basic auth turned off when an operator upgraded the Static file build pack in the foundation to one of the vulnerable versions. Note that Static file applications without a Static file are technically misconfigured, and will not successfully detect unless the Static file build pack is explicitly specified.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloud Foundry CF Release | =255 | |
Cloud Foundry Staticfile Buildpack | =1.4.0 | |
Cloud Foundry Staticfile Buildpack | =1.4.1 | |
Cloud Foundry Staticfile Buildpack | =1.4.2 | |
Cloud Foundry Staticfile Buildpack | =1.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-4970 has a medium severity rating due to its potential impact on authentication configuration.
To fix CVE-2017-4970, you should upgrade to a version of the Cloud Foundry Staticfile buildpack that is not affected, above v1.4.3.
CVE-2017-4970 affects Cloud Foundry Foundation cf-release v255 and Staticfile buildpack versions v1.4.0 to v1.4.3.
The main issue in CVE-2017-4970 is that the Staticfile.auth configuration is ignored when the Staticfile is not present in the application root.
CVE-2017-4970 is not classified as a remotely exploitable vulnerability, but it can impact the security configuration of applications.