CVE-2015-5171

The password change functionality in Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire existing sessions.
References
Link Resource
https://pivotal.io/security/cve-2015-5170-5173 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*
cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:*:*:*:*:*:*:*:*
cpe:2.3:a:pivotal_software:cloud_foundry_uaa:*:*:*:*:*:*:*:*

History

25 Aug 2021, 21:15

Type Values Removed Values Added
CPE cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime_cf_release:*:*:*:*:*:*:*:* cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*

Information

Published : 2017-10-24 17:29

Updated : 2023-12-10 12:15


NVD link : CVE-2015-5171

Mitre link : CVE-2015-5171

CVE.ORG link : CVE-2015-5171


JSON object : View

Products Affected

pivotal_software

  • cloud_foundry_elastic_runtime
  • cloud_foundry_uaa

cloudfoundry

  • cf-release
CWE
CWE-613

Insufficient Session Expiration