CVE-2015-3189 – org.cloudfoundry.identity:cloudfoundry-identity-server
Package
Manager: maven
Name: org.cloudfoundry.identity:cloudfoundry-identity-server
Vulnerable Version: >=0 <2.2.5
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00178 pctl0.39586
Details
Cloud Foundry Runtime has Weak Password Recovery Mechanism for Forgotten Password With Cloud Foundry Runtime cf-release versions v208 or earlier, UAA Standalone versions prior to 2.2.5 and Pivotal Cloud Foundry Runtime 1.4.5 or earlier, old Password Reset Links are not expired after the user changes their current email address to a new one. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected.
Metadata
Created: 2022-05-13T01:07:02Z
Modified: 2024-02-28T18:38:31Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-fj69-p8f6-q97h/GHSA-fj69-p8f6-q97h.json
CWE IDs: ["CWE-640"]
Alternative ID: GHSA-fj69-p8f6-q97h
Finding: F087
Auto approve: 1