Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2018-15754 |
CWE-ID | CWE-285 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Cloud Foundry UAA Server applications / Web servers |
Vendor | Cloud Foundry Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU16595
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-15754
CWE-ID:
CWE-285 - Improper Authorization
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated attacker to bypass security restrictions on the target system.
The vulnerability exists due to an authorization logic error. In environments with multiple identity providers that contain accounts across identity providers with the same username, a remote authenticated with access to one of these accounts can bypass authorization to obtain a token for an account of the same username in the other identity provider.
MitigationUpdate to version 66.0.
Vulnerable software versionsCloud Foundry UAA: 60.0 - 64.0
CPE2.3https://www.cloudfoundry.org/blog/cve-2018-15754/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.