CF CLI version prior to v6.45.0 (bosh release version 1.16.0) writes the client id and secret to its config file when the user authenticates with --client-credentials flag. A local authenticated malicious user with access to the CF CLI config file can act as that client, who is the owner of the leaked credentials.
No CVSS v3.1
Attack Vector Local
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
AV:L/AC:L/Au:N/C:P/I:N/A:N
Vendors | Products |
---|---|
Pivotal |
|
Synopsys |
|
Signalsciences |
|
Samba |
|
Contrastsecurity |
|
Wavefront |
|
Ibm |
|
Microsoft |
|
Dynatrace |
|
Anynines |
|
Appdynamics |
|
Solace |
|
Sumologic |
|
Cyberark |
|
Forgerock |
|
Newrelic |
|
Pagerduty |
|
Datadoghq |
|
Datastax |
|
Splunk |
|
Bluemedora |
|
|
|
Riverbed |
|
Yugabyte |
|
Snyk |
|
Tibco |
|
Apigee |
|
Configuration 1 [-]
|
Configuration 2 [-]
|
Configuration 3 [-]
|
References
Link | Resource |
---|---|
https://pivotal.io/security/cve-2019-3800 | Vendor Advisory |
https://www.cloudfoundry.org/blog/cve-2019-3800 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: dell
Published: 2019-07-18T00:00:00
Updated: 2019-08-05T16:38:20
Reserved: 2019-01-03T00:00:00
Link: CVE-2019-3800
JSON object: View
NVD Information
Status : Modified
Published: 2019-08-05T17:15:10.960
Modified: 2019-10-09T23:49:40.947
Link: CVE-2019-3800
JSON object: View
Redhat Information
No data.