First published: Thu Oct 01 2020(Updated: )
BOSH System Metrics Server releases prior to 0.1.0 exposed the UAA password as a flag to a process running on the BOSH director. It exposed the password to any user or process with access to the same VM (through ps or looking at process details).
Credit: security@pivotal.io
Affected Software | Affected Version | How to fix |
---|---|---|
Cloud Foundry Bosh System Metrics Server | <0.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5422 is considered a critical vulnerability due to the exposure of sensitive UAA passwords.
To fix CVE-2020-5422, upgrade the BOSH System Metrics Server to version 0.1.0 or later.
CVE-2020-5422 affects versions of the Cloud Foundry BOSH System Metrics Server prior to 0.1.0.
CVE-2020-5422 enables attackers with access to the VM to retrieve the UAA password through process details.
Any user or process with VM access where the BOSH System Metrics Server is running is impacted by CVE-2020-5422.