Remote Privilege Escalation Affecting org.cloudfoundry.identity:cloudfoundry-identity-server package, versions [3.0.0,3.3.0.6) [3.4.0,3.4.5) [3.5.0,3.7.3)
Snyk CVSS
Attack Complexity
Low
Confidentiality
High
Integrity
High
Availability
High
Threat Intelligence
EPSS
0.19% (57th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGCLOUDFOUNDRYIDENTITY-31073
- published 28 Sep 2016
- disclosed 28 Sep 2016
- credit Unknown
Introduced: 28 Sep 2016
CVE-2016-6651 Open this link in a new tabOverview
org.cloudfoundry.identity:cloudfoundry-identity-server
The UAA /oauth/token endpoint in Pivotal Cloud Foundry (PCF) before 243; UAA 2.x before 2.7.4.8, 3.x before 3.3.0.6, and 3.4.x before 3.4.5; UAA BOSH before 11.7 and 12.x before 12.6; Elastic Runtime before 1.6.40, 1.7.x before 1.7.21, and 1.8.x before 1.8.2; and Ops Manager 1.7.x before 1.7.13 and 1.8.x before 1.8.1 allows remote authenticated users to gain privileges by leveraging possession of a token.