cvelist/2018/1xxx/CVE-2018-1262.json

64 lines
1.9 KiB
JSON
Raw Normal View History

2017-12-06 13:05:12 -05:00
{
"CVE_data_meta" : {
2018-05-15 16:06:02 -04:00
"ASSIGNER" : "security_alert@emc.com",
"DATE_PUBLIC" : "2018-05-09T00:00:00",
2017-12-06 13:05:12 -05:00
"ID" : "CVE-2018-1262",
2018-05-15 14:34:41 -04:00
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "CloudFoundry UAA",
"version" : {
"version_data" : [
{
"version_value" : "4.12.X and 4.13.X"
}
]
}
}
]
},
"vendor_name" : "Cloud Foundry"
}
]
}
2017-12-06 13:05:12 -05:00
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
2018-05-15 16:06:02 -04:00
"value" : "Cloud Foundry Foundation UAA, versions 4.12.X and 4.13.X, introduced a feature which could allow privilege escalation across identity zones for clients performing offline validation. A zone administrator could configure their zone to issue tokens which impersonate another zone, granting up to admin privileges in the impersonated zone for clients performing offline token validation."
2018-05-15 14:34:41 -04:00
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Privilege escalation"
}
]
}
]
},
"references" : {
"reference_data" : [
{
2018-05-15 16:06:02 -04:00
"name" : "https://www.cloudfoundry.org/blog/cve-2018-1262/",
"refsource" : "CONFIRM",
2018-05-15 15:11:01 -04:00
"url" : "https://www.cloudfoundry.org/blog/cve-2018-1262/"
2017-12-06 13:05:12 -05:00
}
]
}
}