GHSA-fm5c-2rwc-887w

Suggest an improvement
Source
https://github.com/advisories/GHSA-fm5c-2rwc-887w
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-fm5c-2rwc-887w/GHSA-fm5c-2rwc-887w.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-fm5c-2rwc-887w
Aliases
Published
2022-05-13T01:07:24Z
Modified
2024-12-05T05:26:00.892482Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Cloud Foundry UAA reset password vulnerable to brute force attack
Details

The UAA reset password flow in Cloud Foundry release v236 and earlier versions, UAA release v3.3.0 and earlier versions, all versions of Login-server, UAA release v10 and earlier versions and Pivotal Elastic Runtime versions prior to 1.7.2 is vulnerable to a brute force attack due to multiple active codes at a given time. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected.

Database specific
{
    "nvd_published_at": "2017-05-25T17:29:00Z",
    "cwe_ids": [],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-02-28T22:07:55Z"
}
References

Affected packages

Maven / org.cloudfoundry.identity:cloudfoundry-identity-server

Package

Name
org.cloudfoundry.identity:cloudfoundry-identity-server
View open source insights on deps.dev
Purl
pkg:maven/org.cloudfoundry.identity/cloudfoundry-identity-server

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.0.1

Affected versions

3.*

3.0.0
3.0.1
3.1.0
3.2.0
3.2.1
3.3.0