First published: Mon Apr 08 2019(Updated: )
Cloud Foundry BOSH Backup and Restore CLI, all versions prior to 1.5.0, does not check the authenticity of backup scripts in BOSH. A remote authenticated malicious user can modify the metadata file of a Bosh Backup and Restore job to request extra backup files from different jobs upon restore. The exploited hooks in this metadata script were only maintained in the cfcr-etcd-release, so clusters deployed with the BBR job for etcd in this release are vulnerable.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudfoundry Bosh Backup And Restore | <1.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-3786.
The severity of CVE-2019-3786 is high with a CVSS score of 7.1.
The affected software for CVE-2019-3786 is Cloud Foundry BOSH Backup and Restore CLI version prior to 1.5.0.
CVE-2019-3786 allows a remote authenticated malicious user to modify the metadata file of a BOSH Backup and Restore job to request extra backup files from different jobs upon restore.
Yes, the fix for CVE-2019-3786 is to upgrade to Cloud Foundry BOSH Backup and Restore CLI version 1.5.0 or later.