{ "id": "CVE-2024-37082", "sourceIdentifier": "security@vmware.com", "published": "2024-07-03T06:15:03.633", "lastModified": "2024-07-12T17:15:10.220", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "When deploying Cloud Foundry together with the haproxy-boshrelease and using a non default configuration, it might be possible to craft HTTP requests that bypass mTLS authentication to Cloud Foundry applications.\u00a0\n\nYou are affected if you have route-services enabled in routing-release and have configured the haproxy-boshrelease property \u201cha_proxy.forwarded_client_cert\u201d to \u201cforward_only_if_route_service\u201d." }, { "lang": "es", "value": "La laguna de control de seguridad en la versi\u00f3n HAProxy (en combinaci\u00f3n con la versi\u00f3n de enrutamiento) en Cloud Foundry anterior a v40.17.0 potencialmente permite omitir la autenticaci\u00f3n mTLS en aplicaciones alojadas en Cloud Foundry." } ], "metrics": { "cvssMetricV31": [ { "source": "security@vmware.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL" }, "exploitabilityScore": 3.9, "impactScore": 5.2 } ] }, "weaknesses": [ { "source": "security@vmware.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-290" } ] } ], "references": [ { "url": "https://www.cloudfoundry.org/blog/cve-2024-37082-mtls-bypass/", "source": "security@vmware.com" } ] }