First published: Mon Nov 11 2024(Updated: )
Authenticated users can upload specifically crafted files to leak server resources. This behavior can potentially be used to run a denial of service attack against Cloud Controller. The Cloud Foundry project recommends upgrading the following releases: * Upgrade capi release version to 1.194.0 or greater * Upgrade cf-deployment version to v44.1.0 or greater. This includes a patched capi release
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloud Foundry CAPI | >=1.194.0 | |
Cloud Foundry cf-deployment | >=v44.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38826 is a denial of service vulnerability that can be exploited by authenticated users.
To fix CVE-2024-38826, it is recommended to upgrade to the latest versions of Cloud Foundry CAPI and cf-deployment, as specified in the vulnerability advisory.
CVE-2024-38826 affects Cloud Foundry CAPI versions 1.194.0 and later, as well as cf-deployment version v44.1.0 and later.
Exploiting CVE-2024-38826 can lead to the leakage of server resources and potential denial of service against the Cloud Controller.
Currently, the best approach to mitigate CVE-2024-38826 is to upgrade to the recommended secure releases, as no specific workarounds are provided.