First published: Tue Jun 18 2019(Updated: )
Cloud Foundry BOSH 270.x versions prior to v270.1.1, contain a BOSH Director that does not properly redact credentials when configured to use a MySQL database. A local authenticated malicious user may read any credentials that are contained in a BOSH manifest.
Credit: security@pivotal.io
Affected Software | Affected Version | How to fix |
---|---|---|
Cloud Foundry BOSH | >=270.0.0<270.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11271 is considered a high severity vulnerability due to its potential for credential exposure.
To fix CVE-2019-11271, upgrade the Cloud Foundry BOSH to version 270.1.1 or later.
CVE-2019-11271 allows local authenticated malicious users to read unredacted credentials in BOSH manifests.
CVE-2019-11271 affects Cloud Foundry BOSH versions 270.0.0 and earlier.
No, CVE-2019-11271 requires local authentication for exploitation.