Authenticated users can upload specifically crafted files to leak server resources. This behavior can potentially be used to run a denial of service attack against Cloud Controller.
The Cloud Foundry project recommends upgrading the following releases:
* Upgrade capi release version to 1.194.0 or greater
* Upgrade cf-deployment version to v44.1.0 or greater. This includes a patched capi release
Metrics
Affected Vendors & Products
References
History
Tue, 12 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cloudfoundry
Cloudfoundry cloud Foundry |
|
CPEs | cpe:2.3:a:cloudfoundry:cloud_foundry:*:*:*:*:*:*:*:* | |
Vendors & Products |
Cloudfoundry
Cloudfoundry cloud Foundry |
|
Metrics |
ssvc
|
Mon, 11 Nov 2024 05:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Authenticated users can upload specifically crafted files to leak server resources. This behavior can potentially be used to run a denial of service attack against Cloud Controller. The Cloud Foundry project recommends upgrading the following releases: * Upgrade capi release version to 1.194.0 or greater * Upgrade cf-deployment version to v44.1.0 or greater. This includes a patched capi release | |
Title | CVE-2024-38826 Cloud Controller Denial of Service Attack | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: vmware
Published: 2024-11-11T05:33:44.634Z
Updated: 2024-11-12T18:53:57.938Z
Reserved: 2024-06-19T22:32:07.790Z
Link: CVE-2024-38826
Vulnrichment
Updated: 2024-11-12T18:53:52.305Z
NVD
Status : Awaiting Analysis
Published: 2024-11-11T06:15:04.963
Modified: 2024-11-12T13:55:21.227
Link: CVE-2024-38826
Redhat
No data.