First published: Fri Sep 08 2023(Updated: )
Cloud foundry routing release versions prior to 0.278.0 are vulnerable to abuse of HTTP Hop-by-Hop Headers. An unauthenticated attacker can use this vulnerability for headers like B3 or X-B3-SpanID to affect the identification value recorded in the logs in foundations.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudfoundry Cf-deployment | <32.4.0 | |
Cloudfoundry Routing-release | <0.278.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-34041.
The severity of CVE-2023-34041 is medium, with a severity value of 5.3.
Cloud foundry routing release versions prior to 0.278.0 are affected by CVE-2023-34041.
An unauthenticated attacker can exploit this vulnerability by abusing HTTP Hop-by-Hop Headers, such as B3 or X-B3-SpanID, to affect the identification value recorded in the logs in foundations.
Yes, you can find more information about CVE-2023-34041 at the following link: [https://www.cloudfoundry.org/blog/abuse-of-http-hop-by-hop-headers-in-cloud-foundry-gorouter/](https://www.cloudfoundry.org/blog/abuse-of-http-hop-by-hop-headers-in-cloud-foundry-gorouter/)