CVE-2020-5423Uncontrolled Resource Consumption in Foundry Capi

Severity
7.5HIGHNVD
EPSS
0.4%
top 37.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 2
Latest updateMay 24

Description

CAPI (Cloud Controller) versions prior to 1.101.0 are vulnerable to a denial-of-service attack in which an unauthenticated malicious attacker can send specially-crafted YAML files to certain endpoints, causing the YAML parser to consume excessive CPU and RAM.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

CVEListV5cloud_foundry/capiAll1.101.0
CVEListV5cloud_foundry/cf_deploymentAll15.0.0

🔴Vulnerability Details

2
GHSA
GHSA-jj4c-53qh-fp5v: CAPI (Cloud Controller) versions prior to 12022-05-24
CVEList
Cloud Controller is vulnerable to denial of service via YAML parsing2020-12-02
CVE-2020-5423 — Uncontrolled Resource Consumption | cvebase