Vulnerability Description
With Cloud Foundry Runtime cf-release versions v208 or earlier, UAA Standalone versions 2.2.5 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier, old Password Reset Links are not expired after the user changes their current email address to a new one. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cloudfoundry | Cf-Release | <= 208 |
| Pivotal Software | Cloud Foundry Elastic Runtime | <= 1.4.5 |
| Pivotal Software | Cloud Foundry Uaa | <= 2.2.5 |
Related Weaknesses (CWE)
References
- https://pivotal.io/security/cve-2015-3189Vendor Advisory
- https://pivotal.io/security/cve-2015-3189Vendor Advisory
FAQ
What is CVE-2015-3189?
CVE-2015-3189 is a vulnerability with a CVSS score of 3.7 (LOW). With Cloud Foundry Runtime cf-release versions v208 or earlier, UAA Standalone versions 2.2.5 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier, old Password Reset Links are not expired af...
How severe is CVE-2015-3189?
CVE-2015-3189 has been rated LOW with a CVSS base score of 3.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-3189?
Check the references section above for vendor advisories and patch information. Affected products include: Cloudfoundry Cf-Release, Pivotal Software Cloud Foundry Elastic Runtime, Pivotal Software Cloud Foundry Uaa.