Description
The UAA OAuth approval pages in Cloud Foundry v208 to v231, Login-server v1.6 to v1.14, UAA v2.0.0 to v2.7.4.1, UAA v3.0.0 to v3.2.0, UAA-Release v2 to v7 and Pivotal Elastic Runtime 1.6.x versions prior to 1.6.20 are vulnerable to an XSS attack by specifying malicious java script content in either the OAuth scopes (SCIM groups) or SCIM group descriptions.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-0796 | The UAA OAuth approval pages in Cloud Foundry v208 to v231, Login-server v1.6 to v1.14, UAA v2.0.0 to v2.7.4.1, UAA v3.0.0 to v3.2.0, UAA-Release v2 to v7 and Pivotal Elastic Runtime 1.6.x versions prior to 1.6.20 are vulnerable to an XSS attack by specifying malicious java script content in either the OAuth scopes (SCIM groups) or SCIM group descriptions. |
References
| Link | Providers |
|---|---|
| https://pivotal.io/security/cve-2016-0781 |
|
History
No history.
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2024-08-05T22:30:04.905Z
Reserved: 2015-12-16T00:00:00.000Z
Link: CVE-2016-0781
No data.
Status : Modified
Published: 2017-05-25T17:29:00.553
Modified: 2026-05-13T00:24:29.033
Link: CVE-2016-0781
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD