First published: Fri May 26 2023(Updated: )
In Cloud foundry routing release versions from 0.262.0 and prior to 0.266.0,a bug in the gorouter process can lead to a denial of service of applications hosted on Cloud Foundry. Under the right circumstances, when client connections are closed prematurely, gorouter marks the currently selected backend as failed and removes it from the routing pool.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudfoundry Routing Release | >=0.262.0<0.266.0 | |
Cloudfoundry Cf-deployment | >=27.4.0<29.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20882 is a vulnerability in Cloud Foundry routing release versions from 0.262.0 and prior to 0.266.0 that can lead to a denial of service of applications hosted on Cloud Foundry.
CVE-2023-20882 affects Cloud Foundry by causing a denial of service of applications hosted on the platform.
The severity of CVE-2023-20882 is medium, with a CVSS score of 5.9.
To fix CVE-2023-20882, it is recommended to update Cloud Foundry routing release to version 0.266.0 or later.
More information about CVE-2023-20882 can be found at the following link: https://www.cloudfoundry.org/blog/cve-2023-20882-gorouter-pruning-via-client-disconnect-resulting-in-dos/