Description
CAPI (Cloud Controller) versions prior to 1.101.0 are vulnerable to a denial-of-service attack in which an unauthenticated malicious attacker can send specially-crafted YAML files to certain endpoints, causing the YAML parser to consume excessive CPU and RAM.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-26591 | CAPI (Cloud Controller) versions prior to 1.101.0 are vulnerable to a denial-of-service attack in which an unauthenticated malicious attacker can send specially-crafted YAML files to certain endpoints, causing the YAML parser to consume excessive CPU and RAM. |
References
| Link | Providers |
|---|---|
| https://www.cloudfoundry.org/blog/cve-2020-5423 |
|
History
No history.
Status: PUBLISHED
Assigner: pivotal
Published:
Updated: 2024-09-17T03:43:03.193Z
Reserved: 2020-01-03T00:00:00.000Z
Link: CVE-2020-5423
No data.
Status : Modified
Published: 2020-12-02T02:15:12.033
Modified: 2024-11-21T05:34:08.647
Link: CVE-2020-5423
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD