Scheduler for TAS prior to version 1.4.0 was permitting plaintext transmission of UAA client token by sending it over a non-TLS connection. This also depended on the configuration of the MySQL server which is used to cache a UAA client token used by the service. If intercepted the token can give an attacker admin level access in the cloud controller.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: pivotal

Published:

Updated: 2024-09-17T03:03:38.361Z

Reserved: 2020-01-03T00:00:00

Link: CVE-2020-5426

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-11-11T17:15:13.197

Modified: 2024-11-21T05:34:08.880

Link: CVE-2020-5426

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.