Cloud Foundry CLI 信息泄露漏洞

CVE编号

CVE-2019-3800

利用情况

暂无

补丁情况

N/A

披露时间

2019-08-06
漏洞描述
Cloud Foundry CLI是美国Cloud Foundry基金会的一款用于Cloud Foundry的命令行客户端程序。
Cloud Foundry CLI中存在信息泄露漏洞。本地攻击者可利用该漏洞获取敏感信息,执行操作。以下产品及版本受到影响:Cloud Foundry CF CLI 6.45.0之前版本;CF CLI Release 1.16.0之前版本;CF Networking Release 2.23.0之前版本;CF Routing Release 0.189.0之前版本;CF Smoke Tests 40.0.113之前版本;CF Deployment 10.0.0之前版本;CF Deployment Concourse Tasks 9.3.0之前版本;CF Log Cache Release 2.3.1之前版本;CF Notifications 58之前版本。

解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 anynines elasticsearch * Up to
(excluding)
2.1.2
运行在以下环境
应用 anynines logme * Up to
(excluding)
2.1.2
运行在以下环境
应用 anynines mongodb * Up to
(excluding)
2.1.2
运行在以下环境
应用 anynines mysql * Up to
(excluding)
2.1.2
运行在以下环境
应用 anynines postgresql * Up to
(excluding)
2.1.2
运行在以下环境
应用 anynines rabbitmq * Up to
(excluding)
2.1.2
运行在以下环境
应用 anynines redis * Up to
(excluding)
2.1.2
运行在以下环境
应用 apigee edge_service_broker * Up to
(excluding)
3.1.3
运行在以下环境
应用 appdynamics application_analytics * Up to
(excluding)
4.7.652
运行在以下环境
应用 appdynamics application_performance_monitoring * Up to
(excluding)
4.6.64
运行在以下环境
应用 appdynamics platform_montioring * Up to
(excluding)
4.7.712
运行在以下环境
应用 bluemedora nozzle * Up to
(excluding)
3.1.1
运行在以下环境
应用 contrastsecurity service_broker * Up to
(excluding)
2.2.0
运行在以下环境
应用 cyberark conjur_service_broker * Up to
(excluding)
1.1.1
运行在以下环境
应用 datadoghq application_monitoring * Up to
(excluding)
1.7.0
运行在以下环境
应用 datastax enterprise_service_broker * Up to
(excluding)
1.0.2
运行在以下环境
应用 dynatrace service_broker * Up to
(excluding)
1.4.2
运行在以下环境
应用 forgerock service_broker * Up to
(excluding)
2.1.2
运行在以下环境
应用 google google_cloud_platform_service_broker * Up to
(excluding)
4.2.3
运行在以下环境
应用 ibm websphere_liberty_ * Up to
(excluding)
3.11.0
运行在以下环境
应用 microsoft azure_log_analytics_nozzle * Up to
(excluding)
1.4.1
运行在以下环境
应用 microsoft azure_service_broker * Up to
(excluding)
1.4.1
运行在以下环境
应用 newrelic dotnet_extension_buildpack * Up to
(excluding)
1.1.1
运行在以下环境
应用 newrelic nozzle * Up to
(excluding)
1.1.17
运行在以下环境
应用 newrelic service_broker * Up to
(excluding)
1.12.64
运行在以下环境
应用 pagerduty service_broker * Up to
(excluding)
1.2.4
运行在以下环境
应用 pivotal application_service * From
(including)
2.3.0
Up to
(excluding)
2.3.14
运行在以下环境
应用 pivotal application_service * From
(including)
2.4.0
Up to
(excluding)
2.4.10
运行在以下环境
应用 pivotal application_service * From
(including)
2.5.0
Up to
(excluding)
2.5.6
运行在以下环境
应用 pivotal cloud_foundry_autoscaling_release * Up to
(excluding)
219
运行在以下环境
应用 pivotal cloud_foundry_command_line_interface * Up to
(excluding)
6.45.0
运行在以下环境
应用 pivotal cloud_foundry_command_line_interface_release * Up to
(excluding)
1.16.0
运行在以下环境
应用 pivotal cloud_foundry_deployment * Up to
(excluding)
10.0.0
运行在以下环境
应用 pivotal cloud_foundry_deployment_concourse_tasks * Up to
(excluding)
9.3.0
运行在以下环境
应用 pivotal cloud_foundry_event_alerts * Up to
(excluding)
1.2.8
运行在以下环境
应用 pivotal cloud_foundry_healthwatch * From
(including)
1.4.0
Up to
(excluding)
1.4.7
运行在以下环境
应用 pivotal cloud_foundry_healthwatch * From
(including)
1.5.0
Up to
(excluding)
1.5.4
运行在以下环境
应用 pivotal cloud_foundry_log_cache_release * Up to
(excluding)
2.3.1
运行在以下环境
应用 pivotal cloud_foundry_networking_release * Up to
(excluding)
2.23.0
运行在以下环境
应用 pivotal cloud_foundry_notifications * Up to
(excluding)
58
运行在以下环境
应用 pivotal cloud_foundry_routing_release * Up to
(excluding)
0.189.0
运行在以下环境
应用 pivotal cloud_foundry_smoke_test * Up to
(excluding)
40.0.113
运行在以下环境
应用 pivotal credhub_service_broker_for_pcf * Up to
(excluding)
1.3.2
运行在以下环境
应用 pivotal metric_registrar_release * Up to
(excluding)
1.2
运行在以下环境
应用 pivotal on_demand_service_broker * Up to
(excluding)
0.29.0
运行在以下环境
应用 pivotal pivotal_cloud_foundry_service_broker * Up to
(excluding)
1.4.13
运行在以下环境
应用 pivotal single_sign-on * From
(including)
1.7.0
Up to
(excluding)
1.7.5
运行在以下环境
应用 pivotal single_sign-on * From
(including)
1.8.0
Up to
(excluding)
1.8.4
运行在以下环境
应用 pivotal single_sign-on * From
(including)
1.9.0
Up to
(excluding)
1.9.1
运行在以下环境
应用 riverbed steelcentral_appinternals * Up to
(excluding)
10.21.1-bl516
运行在以下环境
应用 samba volume_service * Up to
(excluding)
1.1.1
运行在以下环境
应用 signalsciences service_broker * Up to
(excluding)
1.1.0
运行在以下环境
应用 snyk service_broker * Up to
(excluding)
1.0.3
运行在以下环境
应用 solace pubsub+ * Up to
(excluding)
2.3.2
运行在以下环境
应用 splunk nozzle * Up to
(excluding)
1.1.1
运行在以下环境
应用 sumologic nozzle * Up to
(excluding)
1.0.1
运行在以下环境
应用 synopsys seeker_iast_service_broker * Up to
(excluding)
1.2.14
运行在以下环境
应用 tibco businessworks_buildpack * Up to
(excluding)
2.4.4
运行在以下环境
应用 wavefront wavefront_by_vmware_nozzle * Up to
(excluding)
1.0.2
运行在以下环境
应用 yugabyte db_enterprise * Up to
(excluding)
1.1.8
CVSS3评分
7.8
  • 攻击路径
    本地
  • 攻击复杂度
  • 权限要求
  • 影响范围
    未更改
  • 用户交互
  • 可用性
  • 保密性
  • 完整性
CWE-ID 漏洞类型
CWE-200 信息暴露
阿里云安全产品覆盖情况