CVE-2015-5172

Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire password reset links.
References
Link Resource
https://pivotal.io/security/cve-2015-5170-5173 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*
cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:*:*:*:*:*:*:*:*
cpe:2.3:a:pivotal_software:cloud_foundry_uaa:*:*:*:*:*:*:*:*

History

25 Aug 2021, 21:15

Type Values Removed Values Added
CPE cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime_cf_release:*:*:*:*:*:*:*:* cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*

Information

Published : 2017-10-24 17:29

Updated : 2023-12-10 12:15


NVD link : CVE-2015-5172

Mitre link : CVE-2015-5172

CVE.ORG link : CVE-2015-5172


JSON object : View

Products Affected

cloudfoundry

  • cf-release

pivotal_software

  • cloud_foundry_elastic_runtime
  • cloud_foundry_uaa
CWE
CWE-640

Weak Password Recovery Mechanism for Forgotten Password