First published: Thu Apr 25 2019(Updated: )
Cloud Foundry cf-deployment, versions prior to 7.9.0, contain java components that are using an insecure protocol to fetch dependencies when building. A remote unauthenticated malicious attacker could hijack the DNS entry for the dependency, and inject malicious code into the component.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudfoundry Cf-deployment | <7.9.0 | |
Cloudfoundry Credhub | >=1.9<1.9.10 | |
Cloudfoundry Credhub | >=2.1<2.1.3 | |
Cloudfoundry Uaa Release | <64.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-3801.
CVE-2019-3801 has a severity rating of 9.8, which is considered critical.
Cloud Foundry cf-deployment versions prior to 7.9.0 and certain versions of Cloud Foundry Credhub and Uaa Release are affected by CVE-2019-3801.
A remote unauthenticated attacker can hijack the DNS entry for the dependency and inject malicious code into the component.
Yes, you can find more information about CVE-2019-3801 at the following URLs: - http://www.securityfocus.com/bid/108104 - https://www.cloudfoundry.org/blog/cve-2019-3801