First published: Wed Dec 05 2018(Updated: )
Cloud Foundry NFS volume release, 1.2.x prior to 1.2.5, 1.5.x prior to 1.5.4, 1.7.x prior to 1.7.3, logs the cf admin username and password when running the nfsbrokerpush BOSH deploy errand. A remote authenticated user with access to BOSH can obtain the admin credentials for the Cloud Foundry Platform through the logs of the NFS volume deploy errand.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pivotal Software Cloud Foundry Nfs Volume | >=1.2.0<1.2.5 | |
Pivotal Software Cloud Foundry Nfs Volume | >=1.5.0<1.5.4 | |
Pivotal Software Cloud Foundry Nfs Volume | >=1.7.0<1.7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15797 is a vulnerability in the Cloud Foundry NFS volume release that allows a remote authenticated user with access to BOSH to obtain the admin credentials for the Cloud Foundry Platform.
CVE-2018-15797 has a severity rating of 8.8, indicating a high severity.
CVE-2018-15797 affects Cloud Foundry NFS volume release versions 1.2.x prior to 1.2.5, 1.5.x prior to 1.5.4, and 1.7.x prior to 1.7.3.
A remote authenticated user with access to BOSH can exploit CVE-2018-15797 to obtain the admin credentials for the Cloud Foundry Platform by running the nfsbrokerpush BOSH deploy errand.
Yes, a fix is available for CVE-2018-15797. Users should upgrade to Cloud Foundry NFS volume release 1.2.5, 1.5.4, or 1.7.3 to mitigate the vulnerability.