Cloud Foundry routing-release 0.190.0

CPE Details

Cloud Foundry routing-release 0.190.0
0.190.0
2019-11-27
15h20 +00:00
2019-11-27
15h20 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:cloudfoundry:routing-release:0.190.0:*:*:*:*:*:*:*

Informations

Vendor

cloudfoundry

Product

routing-release

Version

0.190.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-34041 2023-09-08 07h22 +00:00 Cloud foundry routing release versions prior to 0.278.0 are vulnerable to abuse of HTTP Hop-by-Hop Headers. An unauthenticated attacker can use this vulnerability for headers like B3 or X-B3-SpanID to affect the identification value recorded in the logs in foundations.
5.3
Medium
CVE-2020-5416 2020-08-21 21h50 +00:00 Cloud Foundry Routing (Gorouter), versions prior to 0.204.0, when used in a deployment with NGINX reverse proxies in front of the Gorouters, is potentially vulnerable to denial-of-service attacks in which an unauthenticated malicious attacker can send specially-crafted HTTP requests that may cause the Gorouters to be dropped from the NGINX backend pool.
6.5
Medium
CVE-2020-15586 2020-07-17 13h38 +00:00 Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.
5.9
Medium
CVE-2019-11289 2019-11-19 18h41 +00:00 Cloud Foundry Routing, all versions before 0.193.0, does not properly validate nonce input. A remote unauthenticated malicious user could forge an HTTP route service request using an invalid nonce that will cause the Gorouter to crash.
8.6
High