First published: Thu Jan 04 2018(Updated: )
An issue was discovered in these Pivotal Cloud Foundry products: all versions prior to cf-release v270, UAA v3.x prior to v3.20.2, and UAA bosh v30.x versions prior to v30.8 and all other versions prior to v45.0. A cross-site scripting (XSS) attack is possible in the clientId parameter of a request to the UAA OpenID Connect check session iframe endpoint used for single logout session management.
Credit: security_alert@emc.com security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudfoundry Cf-release | <=269 | |
Pivotal Uaa | >=3.0.0<=3.20.1 | |
Pivotal Uaa Bosh | <=44 | |
maven/org.cloudfoundry.identity:cloudfoundry-identity-server | >=3.0.0<3.20.2 | 3.20.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-1190 is medium with a score of 6.1.
CVE-2018-1190 affects all versions prior to cf-release v270, UAA v3.x prior to v3.20.2, and UAA bosh v30.x versions prior to v30.8 and all other versions prior to v45.0.
CVE-2018-1190 is a cross-site scripting (XSS) vulnerability.
The cross-site scripting (XSS) attack can be exploited by injecting malicious code into the clientId parameter of a request.
More information about CVE-2018-1190 can be found at the following references: [SecurityFocus](http://www.securityfocus.com/bid/102427) and [Cloudfoundry](https://www.cloudfoundry.org/cve-2018-1190/).