Cross-site Request Forgery (CSRF)org.cloudfoundry.identity:cloudfoundry-identity-login
Affected versions of the package are vulnerable to Cross-site Request Forgery (CSRF) via the change_email form. An attacker may trigger an e-mail change for a olgged in user via a malicious link on a attacker controlled site.
| |
Open Redirect | |
Cross-domain Referer Leakage | |
Improper Authentication | |
Cross-site Request Forgery (CSRF)org.cloudfoundry.identity:cloudfoundry-identity-login
Affected versions of the package are vulnerable to Cross-site Request Forgery (CSRF). It is possible to log the user into another account instead of the account they intended to log into because due to lack of CSRF checks.
| |
Brute ForceHow to fix Brute Force? Upgrade org.cloudfoundry.identity:cloudfoundry-identity-login to version 2.7.4.7 or higher.
| |
Cross-site Request Forgery (CSRF)org.cloudfoundry.identity:cloudfoundry-identity-login
Multiple cross-site request forgery (CSRF) vulnerabilities in Pivotal Cloud Foundry (PCF) before 242; UAA 2.x before 2.7.4.7, 3.x before 3.3.0.5, and 3.4.x before 3.4.4; UAA BOSH before 11.5 and 12.x before 12.5; Elastic Runtime before 1.6.40, 1.7.x before 1.7.21, and 1.8.x before 1.8.2; and Ops Manager 1.7.x before 1.7.13 and 1.8.x before 1.8.1 allow remote attackers to hijack the authentication of unspecified victims for requests that approve or deny a scope via a profile or authorize approval page.
| |
Open Redirectorg.cloudfoundry.identity:cloudfoundry-identity-login
The OAuth authorization implementation in Pivotal Cloud Foundry (PCF) before 242; UAA 2.x before 2.7.4.7, 3.x before 3.3.0.5, and 3.4.x before 3.4.4; UAA BOSH before 11.5 and 12.x before 12.5; Elastic Runtime before 1.6.40, 1.7.x before 1.7.21, and 1.8.x before 1.8.1; and Ops Manager 1.7.x before 1.7.13 and 1.8.x before 1.8.1 mishandles redirect_uri subdomains, which allows remote attackers to obtain implicit access tokens via a modified subdomain.
| |
Cross-site Scripting (XSS) | |