First published: Mon Jul 17 2017(Updated: )
The Cloud Controller and Router in Cloud Foundry (CAPI-release capi versions prior to v1.32.0, Routing-release versions prior to v0.159.0, CF-release versions prior to v267) do not validate the issuer on JSON Web Tokens (JWTs) from UAA. With certain multi-zone UAA configurations, zone administrators are able to escalate their privileges.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloud Foundry CAPI-release | <=1.31.0 | |
Cloud Foundry CF Release | <=266 | |
Pivotal Cloud Foundry Routing Release | <=0.158.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8034 is considered a medium severity vulnerability due to improper validation of JSON Web Tokens.
To remediate CVE-2017-8034, upgrade Cloud Foundry's CAPI-release to v1.32.0 or newer, Routing-release to v0.159.0 or newer, and CF-release to v267 or newer.
CVE-2017-8034 can allow unauthorized access to applications if the issuer of JSON Web Tokens is not properly validated.
CVE-2017-8034 affects CAPI-release versions prior to v1.32.0, Routing-release versions prior to v0.159.0, and CF-release versions prior to v267.
There are no known workarounds for CVE-2017-8034; the recommended action is to update to the latest versions.