CVE-2016-6659: UAA Privilege Escalation

By: | December 14, 2016

Share

Severity

Critical

Vendor

Cloud Foundry Foundation

Versions Affected

  • Cloud Foundry release v247 and earlier versions
  • UAA release v3.9.2 & earlier versions
  • UAA bosh release (uaa-release) v23 & earlier versions

Description

This security update resolves vulnerabilities in UAA. The most severe of the vulnerabilities could allow elevation of privilege if an attacker gains access to UAA logs and subsequently runs a specially crafted application that interacts with a configured SAML provider.

Mitigation

OSS users are strongly encouraged to follow one of the mitigations below:

  • Upgrade to Cloud Foundry v248 [1] or later
  • For standalone UAA users:
    • For users using UAA Version 3.0.0 – 3.9.2, please upgrade to UAA Release to v3.9.3[2] or v3.6.5[3]
    • For users using standalone UAA Version 2.X.X, please upgrade to UAA Release to v2.7.4.12 [4]
    • For users using UAA bosh release, please upgrade to UAA-Release v24 [5] if upgrading to v3.9.3 [2] or v13.9 [6] if upgrading to v3.6.5[3]

Credit

  • David King ¬†– ¬†Security Engineer, Government Digital Service
  • Graham Bleach – Technical Architect, Government Digital Service
  • Piotr Komborski – Engineer, Government Digital Service

References

History

2016-12-12: Initial vulnerability report published

Cloud Foundry Foundation Security Team Profile Image

Cloud Foundry Foundation Security Team, AUTHOR

SEE ALL ARTICLES