Cloud Foundry routing-release 0.136.0

CPE Details

Cloud Foundry routing-release 0.136.0
0.136.0
2019-06-05
12h49 +00:00
2019-06-05
12h49 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:cloudfoundry:routing-release:0.136.0:*:*:*:*:*:*:*

Informations

Vendor

cloudfoundry

Product

routing-release

Version

0.136.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-34041 2023-09-08 07h22 +00:00 Cloud foundry routing release versions prior to 0.278.0 are vulnerable to abuse of HTTP Hop-by-Hop Headers. An unauthenticated attacker can use this vulnerability for headers like B3 or X-B3-SpanID to affect the identification value recorded in the logs in foundations.
5.3
Medium
CVE-2020-5416 2020-08-21 21h50 +00:00 Cloud Foundry Routing (Gorouter), versions prior to 0.204.0, when used in a deployment with NGINX reverse proxies in front of the Gorouters, is potentially vulnerable to denial-of-service attacks in which an unauthenticated malicious attacker can send specially-crafted HTTP requests that may cause the Gorouters to be dropped from the NGINX backend pool.
6.5
Medium
CVE-2020-15586 2020-07-17 13h38 +00:00 Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.
5.9
Medium
CVE-2019-11289 2019-11-19 18h41 +00:00 Cloud Foundry Routing, all versions before 0.193.0, does not properly validate nonce input. A remote unauthenticated malicious user could forge an HTTP route service request using an invalid nonce that will cause the Gorouter to crash.
8.6
High
CVE-2018-1193 2018-05-23 15h00 +00:00 Cloud Foundry routing-release, versions prior to 0.175.0, lacks sanitization for user-provided X-Forwarded-Proto headers. A remote user can set the X-Forwarded-Proto header in a request to potentially bypass an application requirement to only respond over secure connections.
5.3
Medium
CVE-2018-1221 2018-03-19 18h00 +00:00 In cf-deployment before 1.14.0 and routing-release before 0.172.0, the Cloud Foundry Gorouter mishandles WebSocket requests for AWS Application Load Balancers (ALBs) and some other HTTP-aware Load Balancers. A user with developer privileges could use this vulnerability to steal data or cause denial of service.
8.1
High
CVE-2017-8034 2017-07-17 12h00 +00:00 The Cloud Controller and Router in Cloud Foundry (CAPI-release capi versions prior to v1.32.0, Routing-release versions prior to v0.159.0, CF-release versions prior to v267) do not validate the issuer on JSON Web Tokens (JWTs) from UAA. With certain multi-zone UAA configurations, zone administrators are able to escalate their privileges.
6.6
Medium
CVE-2016-8218 2017-06-13 04h00 +00:00 An issue was discovered in Cloud Foundry Foundation routing-release versions prior to 0.142.0 and cf-release versions 203 to 231. Incomplete validation logic in JSON Web Token (JWT) libraries can allow unprivileged attackers to impersonate other users to the routing API, aka an "Unauthenticated JWT signing algorithm in routing" issue.
9.8
Critical