First published: Tue Oct 03 2017(Updated: )
In Cloud Foundry capi-release versions 1.33.0 and later, prior to 1.42.0 and cf-release versions 268 and later, prior to 274, the original fix for CVE-2017-8033 introduces an API regression that allows a space developer to execute arbitrary code on the Cloud Controller VM by pushing a specially crafted application. NOTE: 274 resolves the vulnerability but has a serious bug that is fixed in 275.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloud Foundry CF Release | =268 | |
Cloud Foundry CF Release | =269 | |
Cloud Foundry CF Release | =270 | |
Cloud Foundry CF Release | =271 | |
Cloud Foundry CF Release | =272 | |
Cloud Foundry CF Release | =273 | |
Pivotal CAPI Release | =1.33.0 | |
Pivotal CAPI Release | =1.34.0 | |
Pivotal CAPI Release | =1.35.0 | |
Pivotal CAPI Release | =1.36.0 | |
Pivotal CAPI Release | =1.37.0 | |
Pivotal CAPI Release | =1.38.0 | |
Pivotal CAPI Release | =1.39.0 | |
Pivotal CAPI Release | =1.40.0 | |
Pivotal CAPI Release | =1.41.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8048 has a critical severity level due to the potential for arbitrary code execution on the Cloud Controller VM.
CVE-2017-8048 affects Cloud Foundry capi-release versions 1.33.0 to 1.41.0 and cf-release versions 268 to 273.
To fix CVE-2017-8048, upgrade to capi-release version 1.42.0 or later and cf-release version 274 or later.
CVE-2017-8048 represents a security vulnerability that allows space developers to execute arbitrary code.
Yes, unauthorized users with space developer roles can exploit CVE-2017-8048 due to its design flaw.