Description
When deploying Cloud Foundry together with the haproxy-boshrelease and using a non default configuration, it might be possible to craft HTTP requests that bypass mTLS authentication to Cloud Foundry applications.
You are affected if you have route-services enabled in routing-release and have configured the haproxy-boshrelease property “ha_proxy.forwarded_client_cert” to “forward_only_if_route_service”.
You are affected if you have route-services enabled in routing-release and have configured the haproxy-boshrelease property “ha_proxy.forwarded_client_cert” to “forward_only_if_route_service”.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-36415 | When deploying Cloud Foundry together with the haproxy-boshrelease and using a non default configuration, it might be possible to craft HTTP requests that bypass mTLS authentication to Cloud Foundry applications. You are affected if you have route-services enabled in routing-release and have configured the haproxy-boshrelease property “ha_proxy.forwarded_client_cert” to “forward_only_if_route_service”. |
References
History
No history.
Subscriptions
No data.
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2024-08-02T03:43:51.046Z
Reserved: 2024-06-03T05:40:17.631Z
Link: CVE-2024-37082
Updated: 2024-08-02T03:43:51.046Z
Status : Deferred
Published: 2024-07-03T06:15:03.633
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-37082
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD