Vulnerability Description
Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire password reset links.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cloudfoundry | Cf-Release | < 216 |
| Pivotal Software | Cloud Foundry Elastic Runtime | < 1.7.0 |
| Pivotal Software | Cloud Foundry Uaa | < 2.5.2 |
Related Weaknesses (CWE)
References
- https://pivotal.io/security/cve-2015-5170-5173Vendor Advisory
- https://pivotal.io/security/cve-2015-5170-5173Vendor Advisory
FAQ
What is CVE-2015-5172?
CVE-2015-5172 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire p...
How severe is CVE-2015-5172?
CVE-2015-5172 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2015-5172?
Check the references section above for vendor advisories and patch information. Affected products include: Cloudfoundry Cf-Release, Pivotal Software Cloud Foundry Elastic Runtime, Pivotal Software Cloud Foundry Uaa.