Description
Cloud Foundry Stratos, versions prior to 2.3.0, deploys with a public default session store secret. A malicious user with default session store secret can brute force another user's current Stratos session, and act on behalf of that user.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-13414 | Cloud Foundry Stratos, versions prior to 2.3.0, deploys with a public default session store secret. A malicious user with default session store secret can brute force another user's current Stratos session, and act on behalf of that user. |
References
| Link | Providers |
|---|---|
| https://www.cloudfoundry.org/blog/cve-2019-3783 |
|
History
No history.
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2024-09-16T23:15:59.788Z
Reserved: 2019-01-03T00:00:00.000Z
Link: CVE-2019-3783
No data.
Status : Modified
Published: 2019-03-07T18:29:00.633
Modified: 2024-11-21T04:42:32.067
Link: CVE-2019-3783
No data.
OpenCVE Enrichment
No data.
EUVD