2017-12-06 13:05:12 -05:00
{
2019-03-17 23:59:08 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "security_alert@emc.com" ,
"DATE_PUBLIC" : "2018-05-21T00:00:00" ,
"ID" : "CVE-2018-1193" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Cloud Foundry Router" ,
"version" : {
"version_data" : [
{
"version_value" : "versions prior to 0.175.0"
}
]
}
}
]
} ,
"vendor_name" : "Cloud Foundry"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
2018-05-23 09:54:55 -04:00
{
2019-03-17 23:59:08 +00:00
"lang" : "eng" ,
"value" : "Cloud Foundry routing-release, versions prior to 0.175.0, lacks sanitization for user-provided X-Forwarded-Proto headers. A remote user can set the X-Forwarded-Proto header in a request to potentially bypass an application requirement to only respond over secure connections."
2018-05-23 09:54:55 -04:00
}
2019-03-17 23:59:08 +00:00
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "User-provided value sanitization"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "https://www.cloudfoundry.org/blog/cve-2018-1193/" ,
"refsource" : "CONFIRM" ,
"url" : "https://www.cloudfoundry.org/blog/cve-2018-1193/"
}
]
}
}