Cloud Foundry Logo

CVE-2020-5417: Cloud Controller may allow developers to claim sensitive routes


Share

Severity

High

Vendor

Cloud Foundry Foundation

Description

Cloud Foundry CAPI (Cloud Controller), versions prior to 1.97.0, when used in a deployment where an app domain is also the system domain (which is true in the default CF Deployment manifest), is vulnerable to developers maliciously or accidentally claiming certain sensitive routes, potentially resulting in the developer’s app handling some requests that were expected to go to certain system components.

Affected Cloud Foundry Products and Versions

Severity is high unless otherwise noted.

  • CAPI
    • All versions prior to 1.97.0
  • CF Deployment
    • All versions prior to 13.12.0

Mitigation

Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:

  • CAPI
    • Upgrade all versions to 1.97.0 or greater
  • CF Deployment
    • Upgrade all versions to 13.12.0 or greater

History

2020-08-13: Initial vulnerability report published.

Cloud Foundry Foundation Security Team Profile Image

Cloud Foundry Foundation Security Team, AUTHOR

SEE ALL ARTICLES