First published: Mon Mar 19 2018(Updated: )
In Cloud Controller versions prior to 1.46.0, cf-deployment versions prior to 1.3.0, and cf-release versions prior to 283, Cloud Controller accepts refresh tokens for authentication where access tokens are expected. This exposes a vulnerability where a refresh token that would otherwise be insufficient to obtain an access token, either due to lack of client credentials or revocation, would allow authentication.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudfoundry Capi-release | <1.46.0 | |
Cloudfoundry Cf-deployment | <1.3.0 | |
Cloudfoundry Cf-release | <283 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1195 is a vulnerability in Cloud Controller, cf-deployment, and cf-release that allows refresh tokens to be used for authentication instead of access tokens.
The severity of CVE-2018-1195 is high with a CVSS score of 8.8.
Cloud Controller versions prior to 1.46.0, cf-deployment versions prior to 1.3.0, and cf-release versions prior to 283 are affected by CVE-2018-1195.
CVE-2018-1195 allows the use of refresh tokens for authentication in Cloud Controller where access tokens are expected.
To fix CVE-2018-1195, users should update to Cloud Controller version 1.46.0, cf-deployment version 1.3.0, or cf-release version 283.