Skip to content

Cloud Foundry Runtime has Weak Password Recovery Mechanism for Forgotten Password

Low severity GitHub Reviewed Published May 13, 2022 to the GitHub Advisory Database • Updated Feb 28, 2024

Package

maven org.cloudfoundry.identity:cloudfoundry-identity-server (Maven)

Affected versions

< 2.2.5

Patched versions

2.2.5

Description

With Cloud Foundry Runtime cf-release versions v208 or earlier, UAA Standalone versions prior to 2.2.5 and Pivotal Cloud Foundry Runtime 1.4.5 or earlier, old Password Reset Links are not expired after the user changes their current email address to a new one. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected.

References

Published by the National Vulnerability Database May 25, 2017
Published to the GitHub Advisory Database May 13, 2022
Reviewed Feb 28, 2024
Last updated Feb 28, 2024

Severity

Low
3.7
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Weaknesses

CVE ID

CVE-2015-3189

GHSA ID

GHSA-fj69-p8f6-q97h

Source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.