logo

CVE-2015-3189 org.cloudfoundry.identity:cloudfoundry-identity-server

Package

Manager: maven
Name: org.cloudfoundry.identity:cloudfoundry-identity-server
Vulnerable Version: >=0 <2.2.5

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00178 pctl0.39586

Details

Cloud Foundry Runtime has Weak Password Recovery Mechanism for Forgotten Password With Cloud Foundry Runtime cf-release versions v208 or earlier, UAA Standalone versions prior to 2.2.5 and Pivotal Cloud Foundry Runtime 1.4.5 or earlier, old Password Reset Links are not expired after the user changes their current email address to a new one. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected.

Metadata

Created: 2022-05-13T01:07:02Z
Modified: 2024-02-28T18:38:31Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-fj69-p8f6-q97h/GHSA-fj69-p8f6-q97h.json
CWE IDs: ["CWE-640"]
Alternative ID: GHSA-fj69-p8f6-q97h
Finding: F087
Auto approve: 1