GHSA-fj69-p8f6-q97h

Suggest an improvement
Source
https://github.com/advisories/GHSA-fj69-p8f6-q97h
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-fj69-p8f6-q97h/GHSA-fj69-p8f6-q97h.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-fj69-p8f6-q97h
Aliases
  • CVE-2015-3189
Published
2022-05-13T01:07:02Z
Modified
2024-02-28T18:58:31.755019Z
Severity
  • 3.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Cloud Foundry Runtime has Weak Password Recovery Mechanism for Forgotten Password
Details

With Cloud Foundry Runtime cf-release versions v208 or earlier, UAA Standalone versions prior to 2.2.5 and Pivotal Cloud Foundry Runtime 1.4.5 or earlier, old Password Reset Links are not expired after the user changes their current email address to a new one. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected.

References

Affected packages

Maven / org.cloudfoundry.identity:cloudfoundry-identity-server

Package

Name
org.cloudfoundry.identity:cloudfoundry-identity-server
View open source insights on deps.dev
Purl
pkg:maven/org.cloudfoundry.identity/cloudfoundry-identity-server

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.5