First published: Wed Jun 06 2018(Updated: )
Cloud Foundry Diego, release versions prior to 2.8.0, does not properly sanitize file paths in tar and zip files headers. A remote attacker with CF admin privileges can upload a malicious buildpack that will allow a complete takeover of a Diego Cell VM and access to all apps running on that Diego Cell.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudfoundry Cf-deployment | <1.37.0 | |
Pivotal Software Cloud Foundry Diego | <2.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-1265.
The severity of CVE-2018-1265 is high with a CVSS score of 7.2.
The affected software includes Cloud Foundry Diego release versions prior to 2.8.0.
CVE-2018-1265 allows a remote attacker with CF admin privileges to upload a malicious buildpack, resulting in a complete takeover of a Diego Cell VM and access to all apps running on that Diego Cell.
You can find more information about CVE-2018-1265 at the following link: [https://www.cloudfoundry.org/blog/cve-2018-1265/](https://www.cloudfoundry.org/blog/cve-2018-1265/)