First published: Fri Aug 21 2020(Updated: )
Cloud Foundry CAPI (Cloud Controller), versions prior to 1.97.0, when used in a deployment where an app domain is also the system domain (which is true in the default CF Deployment manifest), were vulnerable to developers maliciously or accidentally claiming certain sensitive routes, potentially resulting in the developer's app handling some requests that were expected to go to certain system components.
Credit: security@pivotal.io
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudfoundry Capi-release | <1.97.0 | |
Cloudfoundry Cf-deployment | <13.12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-5417.
The severity of CVE-2020-5417 is high, with a severity value of 8.8.
The affected software of CVE-2020-5417 is Cloud Foundry CAPI (Cloud Controller) versions prior to 1.97.0 and Cloud Foundry CF Deployment versions prior to 13.12.0.
CVE-2020-5417 is a vulnerability in Cloud Foundry CAPI (Cloud Controller) that allows developers to maliciously or accidentally claim certain sensitive routes.
Yes, the fix for CVE-2020-5417 is to update Cloud Foundry CAPI to version 1.97.0 or later, or update Cloud Foundry CF Deployment to version 13.12.0 or later.