CVE-2016-6636
30.09.2016, 00:59
The OAuth authorization implementation in Pivotal Cloud Foundry (PCF) before 242; UAA 2.x before 2.7.4.7, 3.x before 3.3.0.5, and 3.4.x before 3.4.4; UAA BOSH before 11.5 and 12.x before 12.5; Elastic Runtime before 1.6.40, 1.7.x before 1.7.21, and 1.8.x before 1.8.1; and Ops Manager 1.7.x before 1.7.13 and 1.8.x before 1.8.1 mishandles redirect_uri subdomains, which allows remote attackers to obtain implicit access tokens via a modified subdomain.
Vendor | Product | Version |
---|---|---|
cloudfoundry | cloud_foundry_uaa_bosh | 𝑥 ≤ 12.3 |
pivotal_software | cloud_foundry | 𝑥 ≤ 241 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.0 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.1 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.2 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.3 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.4 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.5 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.6 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.7 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.8 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.9 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.10 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.11 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.12 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.13 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.14 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.15 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.17 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.18 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.19 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.20 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.21 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.22 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.23 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.25 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.26 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.27 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.28 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.29 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.30 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.31 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.32 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.33 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.34 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.35 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.36 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.37 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.38 |
pivotal_software | cloud_foundry_elastic_runtime | 1.6.39 |
pivotal_software | cloud_foundry_elastic_runtime | 1.7.0 |
pivotal_software | cloud_foundry_elastic_runtime | 1.7.1 |
pivotal_software | cloud_foundry_elastic_runtime | 1.7.2 |
pivotal_software | cloud_foundry_elastic_runtime | 1.7.3 |
pivotal_software | cloud_foundry_elastic_runtime | 1.7.4 |
pivotal_software | cloud_foundry_elastic_runtime | 1.7.5 |
pivotal_software | cloud_foundry_elastic_runtime | 1.7.6 |
pivotal_software | cloud_foundry_elastic_runtime | 1.7.7 |
pivotal_software | cloud_foundry_elastic_runtime | 1.7.8 |
pivotal_software | cloud_foundry_elastic_runtime | 1.7.9 |
pivotal_software | cloud_foundry_elastic_runtime | 1.7.10 |
pivotal_software | cloud_foundry_elastic_runtime | 1.7.11 |
pivotal_software | cloud_foundry_elastic_runtime | 1.7.12 |
pivotal_software | cloud_foundry_elastic_runtime | 1.7.13 |
pivotal_software | cloud_foundry_elastic_runtime | 1.7.14 |
pivotal_software | cloud_foundry_elastic_runtime | 1.7.15 |
pivotal_software | cloud_foundry_elastic_runtime | 1.7.16 |
pivotal_software | cloud_foundry_elastic_runtime | 1.7.17 |
pivotal_software | cloud_foundry_elastic_runtime | 1.7.18 |
pivotal_software | cloud_foundry_elastic_runtime | 1.7.19 |
pivotal_software | cloud_foundry_elastic_runtime | 1.7.20 |
pivotal_software | cloud_foundry_elastic_runtime | 1.8.0 |
pivotal_software | cloud_foundry_ops_manager | 1.7.0 |
pivotal_software | cloud_foundry_ops_manager | 1.7.1 |
pivotal_software | cloud_foundry_ops_manager | 1.7.2 |
pivotal_software | cloud_foundry_ops_manager | 1.7.3 |
pivotal_software | cloud_foundry_ops_manager | 1.7.4 |
pivotal_software | cloud_foundry_ops_manager | 1.7.5 |
pivotal_software | cloud_foundry_ops_manager | 1.7.6 |
pivotal_software | cloud_foundry_ops_manager | 1.7.7 |
pivotal_software | cloud_foundry_ops_manager | 1.7.8 |
pivotal_software | cloud_foundry_ops_manager | 1.7.9 |
pivotal_software | cloud_foundry_ops_manager | 1.7.10 |
pivotal_software | cloud_foundry_ops_manager | 1.7.11 |
pivotal_software | cloud_foundry_ops_manager | 1.7.12 |
pivotal_software | cloud_foundry_ops_manager | 1.8.0 |
pivotal_software | cloud_foundry_uaa | 2.3.0 |
pivotal_software | cloud_foundry_uaa | 2.3.1 |
pivotal_software | cloud_foundry_uaa | 2.4.0 |
pivotal_software | cloud_foundry_uaa | 2.5.1 |
pivotal_software | cloud_foundry_uaa | 2.6.1 |
pivotal_software | cloud_foundry_uaa | 2.7.0.2 |
pivotal_software | cloud_foundry_uaa | 2.7.0.3 |
pivotal_software | cloud_foundry_uaa | 2.7.1 |
pivotal_software | cloud_foundry_uaa | 2.7.2 |
pivotal_software | cloud_foundry_uaa | 2.7.3 |
pivotal_software | cloud_foundry_uaa | 2.7.4.6 |
pivotal_software | cloud_foundry_uaa | 3.0.0 |
pivotal_software | cloud_foundry_uaa | 3.0.1 |
pivotal_software | cloud_foundry_uaa | 3.1.0 |
pivotal_software | cloud_foundry_uaa | 3.2.0 |
pivotal_software | cloud_foundry_uaa | 3.2.1 |
pivotal_software | cloud_foundry_uaa | 3.3.0 |
pivotal_software | cloud_foundry_uaa | 3.3.0.1 |
pivotal_software | cloud_foundry_uaa | 3.4.0 |
pivotal_software | cloud_foundry_uaa | 3.4.1 |
pivotal_software | cloud_foundry_uaa | 3.4.2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration