Description
An issue was discovered in Cloud Foundry Foundation routing-release versions prior to 0.142.0 and cf-release versions 203 to 231. Incomplete validation logic in JSON Web Token (JWT) libraries can allow unprivileged attackers to impersonate other users to the routing API, aka an "Unauthenticated JWT signing algorithm in routing" issue.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-9066 | An issue was discovered in Cloud Foundry Foundation routing-release versions prior to 0.142.0 and cf-release versions 203 to 231. Incomplete validation logic in JSON Web Token (JWT) libraries can allow unprivileged attackers to impersonate other users to the routing API, aka an "Unauthenticated JWT signing algorithm in routing" issue. |
References
| Link | Providers |
|---|---|
| https://www.cloudfoundry.org/cve-2016-8218/ |
|
History
No history.
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2024-08-06T02:13:21.828Z
Reserved: 2016-09-13T00:00:00.000Z
Link: CVE-2016-8218
No data.
Status : Modified
Published: 2017-06-13T06:29:00.237
Modified: 2026-05-13T00:24:29.033
Link: CVE-2016-8218
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD