First published: Tue Oct 03 2017(Updated: )
In Cloud Foundry router routing-release all versions prior to v0.163.0 and cf-release all versions prior to v274, in some applications, it is possible to append a combination of characters to the URL that will allow for an open redirect. An attacker could exploit this as a phishing attack to gain access to user credentials or other sensitive data. NOTE: 274 resolves the vulnerability but has a serious bug that is fixed in 275.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloud Foundry CF Release | <=273 | |
Pivotal Routing Release | <=0.162.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8047 is classified as a moderate severity vulnerability due to its potential for exploitation in phishing attacks.
To fix CVE-2017-8047, upgrade to Cloud Foundry router routing-release version 0.163.0 or later and cf-release version 274 or later.
CVE-2017-8047 affects Cloud Foundry router routing-release versions prior to 0.163.0 and cf-release versions prior to 274.
CVE-2017-8047 is an open redirect vulnerability that can be exploited in applications using Cloud Foundry.
Yes, CVE-2017-8047 can be used by attackers to carry out phishing attacks which may lead to credential theft.