CVE-2020-5400

Cloud Foundry Cloud Controller (CAPI), versions prior to 1.91.0, logs properties of background jobs when they are run, which may include sensitive information such as credentials if provided to the job. A malicious user with access to those logs may gain unauthorized access to resources protected by such credentials.
References
Link Resource
https://www.cloudfoundry.org/blog/cve-2020-5400 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cloudfoundry:capi-release:*:*:*:*:*:*:*:*
cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*

History

17 Aug 2021, 15:30

Type Values Removed Values Added
CPE cpe:2.3:a:cloudfoundry:cloud_controller:*:*:*:*:*:*:*:* cpe:2.3:a:cloudfoundry:capi-release:*:*:*:*:*:*:*:*

Information

Published : 2020-02-27 20:15

Updated : 2024-02-04 20:39


NVD link : CVE-2020-5400

Mitre link : CVE-2020-5400

CVE.ORG link : CVE-2020-5400


JSON object : View

Products Affected

cloudfoundry

  • cf-deployment
  • capi-release
CWE
CWE-532

Insertion of Sensitive Information into Log File

CWE-522

Insufficiently Protected Credentials