CVE-2020-5400Insufficiently Protected Credentials in Foundry Capi

Severity
6.5MEDIUMNVD
EPSS
0.3%
top 44.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 27
Latest updateMay 24

Description

Cloud Foundry Cloud Controller (CAPI), versions prior to 1.91.0, logs properties of background jobs when they are run, which may include sensitive information such as credentials if provided to the job. A malicious user with access to those logs may gain unauthorized access to resources protected by such credentials.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

CVEListV5cloud_foundry/capiunspecified1.91.0

🔴Vulnerability Details

2
GHSA
GHSA-m9cq-wcff-6m72: Cloud Foundry Cloud Controller (CAPI), versions prior to 12022-05-24
CVEList
Cloud Controller logs environment variables from app manifests2020-02-27

📋Vendor Advisories

1
Cisco
Cisco vWAAS for Cisco ENCS 5400-W Series and CSP 5000-W Series Default Credentials Vulnerability2020-08-19
CVE-2020-5400 — Insufficiently Protected Credentials | cvebase