First published: Wed Dec 02 2020(Updated: )
CAPI (Cloud Controller) versions prior to 1.101.0 are vulnerable to a denial-of-service attack in which an unauthenticated malicious attacker can send specially-crafted YAML files to certain endpoints, causing the YAML parser to consume excessive CPU and RAM.
Credit: security@pivotal.io
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudfoundry Capi-release | <1.101.0 | |
Cloudfoundry Cf-deployment | <15.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-5423.
The severity of CVE-2020-5423 is high.
Versions of CAPI (Cloud Controller) prior to 1.101.0 are affected by CVE-2020-5423.
CVE-2020-5423 can be exploited by an unauthenticated attacker to cause a denial-of-service (DoS) attack by sending specially-crafted YAML files to certain endpoints.
To fix CVE-2020-5423, upgrade CAPI (Cloud Controller) to version 1.101.0 or later.