CVE-2018-1265

Cloud Foundry Diego, release versions prior to 2.8.0, does not properly sanitize file paths in tar and zip files headers. A remote attacker with CF admin privileges can upload a malicious buildpack that will allow a complete takeover of a Diego Cell VM and access to all apps running on that Diego Cell.
References
Link Resource
https://www.cloudfoundry.org/blog/cve-2018-1265/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*
cpe:2.3:a:pivotal_software:cloud_foundry_diego:*:*:*:*:*:*:*:*

History

17 Aug 2021, 14:29

Type Values Removed Values Added
CPE cpe:2.3:a:pivotal_software:cloud_foundry_cf-deployment:*:*:*:*:*:*:*:* cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*

Information

Published : 2018-06-06 20:29

Updated : 2023-12-10 12:30


NVD link : CVE-2018-1265

Mitre link : CVE-2018-1265

CVE.ORG link : CVE-2018-1265


JSON object : View

Products Affected

cloudfoundry

  • cf-deployment

pivotal_software

  • cloud_foundry_diego
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type