First published: Wed Jul 03 2024(Updated: )
When deploying Cloud Foundry together with the haproxy-boshrelease and using a non default configuration, it might be possible to craft HTTP requests that bypass mTLS authentication to Cloud Foundry applications. You are affected if you have route-services enabled in routing-release and have configured the haproxy-boshrelease property “ha_proxy.forwarded_client_cert” to “forward_only_if_route_service”.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloud Foundry HAProxy BOSH Release | ||
Pivotal Routing Release |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37082 is considered a significant vulnerability due to the potential to bypass mTLS authentication.
To mitigate CVE-2024-37082, ensure that your HAProxy and routing releases are configured to default settings and apply any patches provided by Cloud Foundry.
Organizations using Cloud Foundry with route-services enabled in non-default configurations are affected by CVE-2024-37082.
CVE-2024-37082 allows the crafting of HTTP requests that can bypass mTLS authentication to Cloud Foundry applications.
As a temporary workaround for CVE-2024-37082, disable route-services or revert to default configurations until a patch is applied.