First published: Thu Dec 13 2018(Updated: )
Pivotal Concourse Release, versions 4.x prior to 4.2.2, login flow allows redirects to untrusted websites. A remote unauthenticated attacker could convince a user to click on a link using the oAuth redirect link with an untrusted website and gain access to that user's access token in Concourse.
Credit: security_alert@emc.com security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/concourse/concourse | >=5.6.0<5.8.1 | 5.8.1 |
go/github.com/concourse/concourse | >=5.3.0<5.5.10 | 5.5.10 |
go/github.com/concourse/concourse | <5.2.8 | 5.2.8 |
Pivotal Software Concourse | >=4.0.0<4.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15798 is a vulnerability in Pivotal Concourse Release versions 4.x prior to 4.2.2 that allows redirects to untrusted websites.
An attacker can exploit CVE-2018-15798 by convincing a user to click on a link that redirects them to an untrusted website, allowing the attacker to gain access to the user's access token in Concourse.
CVE-2018-15798 has a severity rating of 5.4 (High).
Versions 4.x prior to 4.2.2 are affected by CVE-2018-15798.
To fix CVE-2018-15798, upgrade to Pivotal Concourse Release version 5.2.8 or higher.