CVE-2018-11047

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-11047
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-11047.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-11047
Aliases
Published
2018-07-24T19:29:00Z
Modified
2024-09-03T02:02:46.781988Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

Cloud Foundry UAA, versions 4.19 prior to 4.19.2 and 4.12 prior to 4.12.4 and 4.10 prior to 4.10.2 and 4.7 prior to 4.7.6 and 4.5 prior to 4.5.7, incorrectly authorizes requests to admin endpoints by accepting a valid refresh token in lieu of an access token. Refresh tokens by design have a longer expiration time than access tokens, allowing the possessor of a refresh token to authenticate longer than expected. This affects the administrative endpoints of the UAA. i.e. /Users, /Groups, etc. However, if the user has been deleted or had groups removed, or the client was deleted, the refresh token will no longer be valid.

References

Affected packages

Git / github.com/cloudfoundry/uaa

Affected ranges

Type
GIT
Repo
https://github.com/cloudfoundry/uaa
Events

Affected versions

4.*

4.5.0
4.5.1
4.5.2
4.5.3
4.5.4
4.5.5
4.5.6