Vulnerabilities > Pivotal Software > Cloud Foundry Elastic Runtime > 1.6.35

DATE CVE VULNERABILITY TITLE RISK
2018-03-29 CVE-2016-6658 Information Exposure vulnerability in multiple products
Applications in cf-release before 245 can be configured and pushed with a user-provided custom buildpack using a URL pointing to the buildpack.
network
low complexity
cloudfoundry pivotal-software CWE-200
4.0
2017-10-24 CVE-2015-5173 Information Exposure vulnerability in multiple products
Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact via vectors involving emails with password recovery links, aka "Cross Domain Referer Leakage."
6.8
2017-10-24 CVE-2015-5172 Weak Password Recovery Mechanism for Forgotten Password vulnerability in multiple products
Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire password reset links.
network
low complexity
cloudfoundry pivotal-software CWE-640
7.5
2017-10-24 CVE-2015-5171 Insufficient Session Expiration vulnerability in multiple products
The password change functionality in Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire existing sessions.
network
low complexity
cloudfoundry pivotal-software CWE-613
7.5
2017-10-24 CVE-2015-5170 Cross-Site Request Forgery (CSRF) vulnerability in multiple products
Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow remote attackers to conduct cross-site request forgery (CSRF) attacks on PWS and log a user into an arbitrary account by leveraging lack of CSRF checks.
6.8
2017-06-13 CVE-2017-4955 Information Exposure Through Log Files vulnerability in Pivotal Software Cloud Foundry Elastic Runtime
An issue was discovered in Pivotal PCF Elastic Runtime 1.6.x versions prior to 1.6.65, 1.7.x versions prior to 1.7.48, 1.8.x versions prior to 1.8.28, and 1.9.x versions prior to 1.9.5.
network
low complexity
pivotal-software CWE-532
5.0
2017-06-13 CVE-2017-2773 Improper Input Validation vulnerability in Pivotal Software Cloud Foundry Elastic Runtime
An issue was discovered in Pivotal PCF Elastic Runtime 1.6.x versions prior to 1.6.60, 1.7.x versions prior to 1.7.41, 1.8.x versions prior to 1.8.23, and 1.9.x versions prior to 1.9.1.
network
low complexity
pivotal-software CWE-20
7.5
2017-05-25 CVE-2016-3084 Permissions, Privileges, and Access Controls vulnerability in multiple products
The UAA reset password flow in Cloud Foundry release v236 and earlier versions, UAA release v3.3.0 and earlier versions, all versions of Login-server, UAA release v10 and earlier versions and Pivotal Elastic Runtime versions prior to 1.7.2 is vulnerable to a brute force attack due to multiple active codes at a given time.
4.3
2016-09-30 CVE-2016-6651 Permissions, Privileges, and Access Controls vulnerability in multiple products
The UAA /oauth/token endpoint in Pivotal Cloud Foundry (PCF) before 243; UAA 2.x before 2.7.4.8, 3.x before 3.3.0.6, and 3.4.x before 3.4.5; UAA BOSH before 11.7 and 12.x before 12.6; Elastic Runtime before 1.6.40, 1.7.x before 1.7.21, and 1.8.x before 1.8.2; and Ops Manager 1.7.x before 1.7.13 and 1.8.x before 1.8.1 allows remote authenticated users to gain privileges by leveraging possession of a token.
network
low complexity
pivotal-software cloudfoundry CWE-264
6.5
2016-09-30 CVE-2016-6637 Cross-Site Request Forgery (CSRF) vulnerability in multiple products
Multiple cross-site request forgery (CSRF) vulnerabilities in Pivotal Cloud Foundry (PCF) before 242; UAA 2.x before 2.7.4.7, 3.x before 3.3.0.5, and 3.4.x before 3.4.4; UAA BOSH before 11.5 and 12.x before 12.5; Elastic Runtime before 1.6.40, 1.7.x before 1.7.21, and 1.8.x before 1.8.2; and Ops Manager 1.7.x before 1.7.13 and 1.8.x before 1.8.1 allow remote attackers to hijack the authentication of unspecified victims for requests that approve or deny a scope via a profile or authorize approval page.
6.8