fkie_cve-2016-6657
Vulnerability from fkie_nvd
Published
2016-12-16 09:59
Modified
2024-11-21 02:56
Severity ?
Summary
An open redirect vulnerability has been detected with some Pivotal Cloud Foundry Elastic Runtime components. Users of affected versions should apply the following mitigation: Upgrade PCF Elastic Runtime 1.8.x versions to 1.8.12 or later. Upgrade PCF Ops Manager 1.7.x versions to 1.7.18 or later and 1.8.x versions to 1.8.10 or later.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | http://www.securityfocus.com/bid/94126 | Third Party Advisory, VDB Entry | |
security_alert@emc.com | https://pivotal.io/security/cve-2016-6657 | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/94126 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://pivotal.io/security/cve-2016-6657 | Mitigation, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2D55721-7B40-4277-9E5A-4A9688D12ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "7B931453-BA62-45A2-8574-A590E2DE55DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "BA7E6331-33BC-4F3D-86C7-4DDBCB2B3B91", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "9FCBC4AE-B126-4EF6-B75E-062423E3F161", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "ED35AA0C-9427-492A-972A-D82972BBD9CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "7412837F-8F31-48A5-81AF-51E7A4A40310", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "6A8A33E4-AFCD-436B-8635-7F45F4B043F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "79217281-FDA5-44AD-82A9-7375F9562345", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "E7FB48BC-5523-4B18-860C-A1DA648F2C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "2B630514-7848-435E-B9BD-9350BA671D95", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "683152A4-2927-4735-8BFF-B9B499B44D15", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "CC7AEA69-D9C5-4CE8-BD67-9E5E5E7EF343", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.12:*:*:*:*:*:*:*", "matchCriteriaId": "ADD6F12D-6324-48E3-A508-70A7B122CA3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.13:*:*:*:*:*:*:*", "matchCriteriaId": "651B4CA5-EEE2-41CD-8711-F8334D18D91C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.14:*:*:*:*:*:*:*", "matchCriteriaId": "A9034BC4-576A-4357-87ED-37085A5BEC2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.15:*:*:*:*:*:*:*", "matchCriteriaId": "59FD7D94-5D90-4235-AECF-75A1478E9350", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.16:*:*:*:*:*:*:*", "matchCriteriaId": "33A3439C-86CF-4E0E-A072-6CAD1285CC65", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.17:*:*:*:*:*:*:*", "matchCriteriaId": "0E189F0F-B307-457E-ADE6-F6E6E5916388", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "6E8E9EB0-F8BC-4297-B4A3-80346191D98A", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C015DE32-1D60-49EA-889D-B8FE453CF02E", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "7E611FD8-DA12-4DAD-B9B4-A319D0865019", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "71199CD8-08A3-4D2D-A584-82A50C3AB63E", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "546D149D-2B90-4D84-A662-D6E5AC0E38A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "1586A1F4-3542-4F99-B0B6-EBBDF2881744", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "1AD4DBE0-07E2-450F-8354-2838E84D6585", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "62F00D9B-0CEC-4777-89B2-E629C89C4947", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "5F2CD66F-CFE5-43BB-9BC0-44A5986B8B0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "A7E5D0F4-DE8E-461E-93A1-42BE9A214FE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "55799421-1421-47FB-8C2E-F8D4A3B43A6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "619E9045-3F8D-4D1D-99BD-D92EE65A014E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "258FAFB4-2B67-456B-BE78-1562A3D5E9A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "15F08919-8764-419D-A399-1EAA6B055C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "09BA6E79-22B6-4E5E-8C85-BBA8CB6C1828", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "FB328ACE-FC3C-4255-9400-A9BBC5059F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "877383E9-545F-4324-B8EA-76F33B7C11C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "7B6BCA5E-1A43-41AA-ACEC-2C73E1B84D26", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CF15EDB-2707-43E2-9B53-C0CCA28AC972", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "C896CBBE-BE7B-44C3-A25E-F85BC7F6CE51", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "944374E2-A07E-4EEA-BE0C-47EF62FFABA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "CAEA85D5-10B2-4003-A857-2C46F9559694", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "799E1F2E-DA5F-41B5-9B83-55661E18D726", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "AD9369A6-F59D-4C7A-830E-6EAC6F81A493", "vulnerable": true }, { "criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.8.12:*:*:*:*:*:*:*", "matchCriteriaId": "31A2732A-0309-4DF0-9EF1-7954D10BCFCC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An open redirect vulnerability has been detected with some Pivotal Cloud Foundry Elastic Runtime components. Users of affected versions should apply the following mitigation: Upgrade PCF Elastic Runtime 1.8.x versions to 1.8.12 or later. Upgrade PCF Ops Manager 1.7.x versions to 1.7.18 or later and 1.8.x versions to 1.8.10 or later." }, { "lang": "es", "value": "Una vulnerabilidad de redirecci\u00f3n abierta ha sido detectada con algunos componentes Pivotal Cloud Foundry Elastic Runtime. Los usuarios de las versiones afectadas deben aplicar la siguiente mitigaci\u00f3n: Actualizar PCF Elastic Runtime 1.8.x en versiones 1.8.12 o posteriores. Actualizar PCF Ops Manager 1.7.x en versiones 1.7.18 o posteriores y 1.8.x versi\u00f3n 1.8.10 o posteriores." } ], "id": "CVE-2016-6657", "lastModified": "2024-11-21T02:56:33.987", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-12-16T09:59:00.277", "references": [ { "source": "security_alert@emc.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94126" }, { "source": "security_alert@emc.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2016-6657" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://pivotal.io/security/cve-2016-6657" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.