CVE-2019-3801
25.04.2019, 21:29
Cloud Foundry cf-deployment, versions prior to 7.9.0, contain java components that are using an insecure protocol to fetch dependencies when building. A remote unauthenticated malicious attacker could hijack the DNS entry for the dependency, and inject malicious code into the component.Enginsight
Vendor | Product | Version |
---|---|---|
cloudfoundry | cf-deployment | 𝑥 < 7.9.0 |
cloudfoundry | credhub | 1.9 ≤ 𝑥 < 1.9.10 |
cloudfoundry | credhub | 2.1 ≤ 𝑥 < 2.1.3 |
cloudfoundry | uaa_release | 𝑥 < 64.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-494 - Download of Code Without Integrity CheckThe product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code.
- CWE-319 - Cleartext Transmission of Sensitive InformationThe software transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.