"TITLE":"BBR could run arbitrary scripts on deployment VMs"
},
"source":{
"discovery":"UNKNOWN"
},
"affects":{
"vendor":{
"vendor_data":[
{
"product":{
"product_data":[
{
"product_name":"BOSH Backup and Restore",
"version":{
"version_data":[
{
"affected":"<",
"version_name":"All",
"version_value":"v1.5.0"
}
]
}
}
]
},
"vendor_name":"Cloud Foundry"
}
]
}
},
"description":{
"description_data":[
{
"lang":"eng",
"value":"Cloud Foundry BOSH Backup and Restore CLI, all versions prior to 1.5.0, does not check the authenticity of backup scripts in BOSH. A remote authenticated malicious user can modify the metadata file of a Bosh Backup and Restore job to request extra backup files from different jobs upon restore. The exploited hooks in this metadata script were only maintained in the cfcr-etcd-release, so clusters deployed with the BBR job for etcd in this release are vulnerable."