First published: Mon Nov 27 2017(Updated: )
In Pivotal Single Sign-On for PCF (1.3.x versions prior to 1.3.4 and 1.4.x versions prior to 1.4.3), certain pages allow code to be injected into the DOM environment through query parameters, leading to XSS attacks.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
vmware Single Sign-On for Pivotal cloud foundry | =1.3.0 | |
vmware Single Sign-On for Pivotal cloud foundry | =1.3.2 | |
vmware Single Sign-On for Pivotal cloud foundry | =1.3.3 | |
vmware Single Sign-On for Pivotal cloud foundry | =1.4.1 | |
vmware Single Sign-On for Pivotal cloud foundry | =1.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8044 is considered a high severity vulnerability due to its potential to allow XSS attacks.
To fix CVE-2017-8044, upgrade Pivotal Single Sign-On to version 1.3.4 or 1.4.3 or later.
CVE-2017-8044 can lead to code injection into the DOM, enabling attackers to execute malicious scripts in the user's browser.
CVE-2017-8044 affects Pivotal Single Sign-On versions 1.3.0 to 1.3.3 and 1.4.1 to 1.4.2.
There are no official workarounds for CVE-2017-8044; upgrading to a patched version is recommended.