First published: Mon Jul 24 2017(Updated: )
An issue was discovered in the Cloud Controller API in Cloud Foundry Foundation CAPI-release version 1.33.0 (only). The original fix for CVE-2017-8033 included in CAPI-release 1.33.0 introduces a regression that allows a space developer to execute arbitrary code on the Cloud Controller VM by pushing a specially crafted application.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloud Foundry CAPI-release | =1.33.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8036 has a critical severity rating due to its potential to allow arbitrary code execution on the Cloud Controller VM.
To resolve CVE-2017-8036, upgrade your Cloud Foundry CAPI-release to a version beyond 1.33.0 that addresses this vulnerability.
CVE-2017-8036 affects users of the Cloud Foundry CAPI-release specifically version 1.33.0.
CVE-2017-8036 allows space developers to execute arbitrary code, potentially compromising the Cloud Controller VM.
There is no known workaround for CVE-2017-8036; upgrading to a safe version is the only effective mitigation.