Vulnerability Details : CVE-2016-8218
An issue was discovered in Cloud Foundry Foundation routing-release versions prior to 0.142.0 and cf-release versions 203 to 231. Incomplete validation logic in JSON Web Token (JWT) libraries can allow unprivileged attackers to impersonate other users to the routing API, aka an "Unauthenticated JWT signing algorithm in routing" issue.
Vulnerability category: Input validation
Exploit prediction scoring system (EPSS) score for CVE-2016-8218
Probability of exploitation activity in the next 30 days: 0.23%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 60 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2016-8218
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2016-8218
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-8218
-
https://www.cloudfoundry.org/cve-2016-8218/
CVE-2016-8218: Unauthenticated JWT signing algorithm in routing | Cloud FoundryPatch;Vendor Advisory
Products affected by CVE-2016-8218
- cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:224:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:223:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:222:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:221:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:207:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:206:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:205:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:204:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:215:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:214:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:213:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:227:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:225:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:220:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:218:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:211:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:209:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:228:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:226:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:219:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:217:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:212:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:210:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:208:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:230:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:229:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:231:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:routing-release:*:*:*:*:*:*:*:*