First published: Sat Sep 09 2017(Updated: )
In Single Sign-On for Pivotal Cloud Foundry (PCF) 1.3.x versions prior to 1.3.4 and 1.4.x versions prior to 1.4.3, a user can execute a XSS attack on certain Single Sign-On service UI pages by inputting code in the text field for an organization name.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
vmware Single Sign-On for Pivotal cloud foundry | =1.3.0 | |
vmware Single Sign-On for Pivotal cloud foundry | =1.3.2 | |
vmware Single Sign-On for Pivotal cloud foundry | =1.3.3 | |
vmware Single Sign-On for Pivotal cloud foundry | =1.4.0 | |
vmware Single Sign-On for Pivotal cloud foundry | =1.4.1 | |
vmware Single Sign-On for Pivotal cloud foundry | =1.4.2 | |
vmware Single Sign-On for Pivotal cloud foundry | =1.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8041 is rated as a medium severity vulnerability due to its potential for XSS exploitation.
To fix CVE-2017-8041, upgrade to Single Sign-On for Pivotal Cloud Foundry version 1.3.4 or 1.4.3 or later.
CVE-2017-8041 allows an attacker to execute a cross-site scripting (XSS) attack on specific Single Sign-On service UI pages.
CVE-2017-8041 affects Single Sign-On for Pivotal Cloud Foundry versions 1.3.0 to 1.3.3 and 1.4.0 to 1.4.2.
Detailed information about CVE-2017-8041 can be found in the official security advisory from Pivotal.