Description
Scheduler for TAS prior to version 1.4.0 was permitting plaintext transmission of UAA client token by sending it over a non-TLS connection. This also depended on the configuration of the MySQL server which is used to cache a UAA client token used by the service. If intercepted the token can give an attacker admin level access in the cloud controller.
Published: 2020-11-11
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-26594 Scheduler for TAS prior to version 1.4.0 was permitting plaintext transmission of UAA client token by sending it over a non-TLS connection. This also depended on the configuration of the MySQL server which is used to cache a UAA client token used by the service. If intercepted the token can give an attacker admin level access in the cloud controller.
History

No history.

Subscriptions

Vmware Pivotal Scheduler
cve-icon MITRE

Status: PUBLISHED

Assigner: pivotal

Published:

Updated: 2024-09-17T03:03:38.361Z

Reserved: 2020-01-03T00:00:00.000Z

Link: CVE-2020-5426

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-11-11T17:15:13.197

Modified: 2024-11-21T05:34:08.880

Link: CVE-2020-5426

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses