Vulnerability Details : CVE-2016-8218
An issue was discovered in Cloud Foundry Foundation routing-release versions prior to 0.142.0 and cf-release versions 203 to 231. Incomplete validation logic in JSON Web Token (JWT) libraries can allow unprivileged attackers to impersonate other users to the routing API, aka an "Unauthenticated JWT signing algorithm in routing" issue.
Vulnerability category: Input validation
Products affected by CVE-2016-8218
- cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:224:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:223:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:222:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:221:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:207:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:206:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:205:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:204:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:215:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:214:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:213:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:227:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:225:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:220:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:218:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:211:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:209:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:228:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:226:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:219:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:217:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:212:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:210:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:208:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:230:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:229:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:cf-release:231:*:*:*:*:*:*:*
- cpe:2.3:a:cloudfoundry:routing-release:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-8218
0.30%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 69 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-8218
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2016-8218
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-8218
-
https://www.cloudfoundry.org/cve-2016-8218/
CVE-2016-8218: Unauthenticated JWT signing algorithm in routing | Cloud FoundryPatch;Vendor Advisory
Jump to