Vulnerability Description
An issue was discovered in the Cloud Controller API in Cloud Foundry Foundation CAPI-release versions after v1.6.0 and prior to v1.35.0 and cf-release versions after v244 and prior to v268. A carefully crafted CAPI request from a Space Developer can allow them to gain access to files on the Cloud Controller VM for that installation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cloudfoundry | Capi-Release | >= 1.7.0, < 1.35.0 |
| Cloudfoundry | Cf-Release | >= 245, < 268 |
Related Weaknesses (CWE)
References
- https://www.cloudfoundry.org/cve-2017-8035/Vendor Advisory
- https://www.cloudfoundry.org/cve-2017-8035/Vendor Advisory
FAQ
What is CVE-2017-8035?
CVE-2017-8035 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered in the Cloud Controller API in Cloud Foundry Foundation CAPI-release versions after v1.6.0 and prior to v1.35.0 and cf-release versions after v244 and prior to v268. A carefull...
How severe is CVE-2017-8035?
CVE-2017-8035 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-8035?
Check the references section above for vendor advisories and patch information. Affected products include: Cloudfoundry Capi-Release, Cloudfoundry Cf-Release.