Description
Cloud Foundry Stratos, versions prior to 2.3.0, deploys with a public default session store secret. A malicious user with default session store secret can brute force another user's current Stratos session, and act on behalf of that user.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-13414 | Cloud Foundry Stratos, versions prior to 2.3.0, deploys with a public default session store secret. A malicious user with default session store secret can brute force another user's current Stratos session, and act on behalf of that user. |
References
| Link | Providers |
|---|---|
| https://www.cloudfoundry.org/blog/cve-2019-3783 |
|
History
No history.
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2024-09-16T23:15:59.788Z
Reserved: 2019-01-03T00:00:00.000Z
Link: CVE-2019-3783
No data.
Status : Modified
Published: 2019-03-07T18:29:00.633
Modified: 2024-11-21T04:42:32.067
Link: CVE-2019-3783
No data.
OpenCVE Enrichment
No data.
EUVD