Authenticated users can upload specifically crafted files to leak server resources. This behavior can potentially be used to run a denial of service attack against Cloud Controller.
The Cloud Foundry project recommends upgrading the following releases:
* Upgrade capi release version to 1.194.0 or greater
* Upgrade cf-deployment version to v44.1.0 or greater. This includes a patched capi release
Metrics
Affected Vendors & Products
References
History
Mon, 17 Mar 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-400 |
Tue, 12 Nov 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cloudfoundry
Cloudfoundry cloud Foundry |
|
| CPEs | cpe:2.3:a:cloudfoundry:cloud_foundry:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Cloudfoundry
Cloudfoundry cloud Foundry |
|
| Metrics |
ssvc
|
Mon, 11 Nov 2024 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Authenticated users can upload specifically crafted files to leak server resources. This behavior can potentially be used to run a denial of service attack against Cloud Controller. The Cloud Foundry project recommends upgrading the following releases: * Upgrade capi release version to 1.194.0 or greater * Upgrade cf-deployment version to v44.1.0 or greater. This includes a patched capi release | |
| Title | CVE-2024-38826 Cloud Controller Denial of Service Attack | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: vmware
Published: 2024-11-11T05:33:44.634Z
Updated: 2025-03-17T22:00:39.865Z
Reserved: 2024-06-19T22:32:07.790Z
Link: CVE-2024-38826
Updated: 2024-11-12T18:53:52.305Z
Status : Awaiting Analysis
Published: 2024-11-11T06:15:04.963
Modified: 2025-03-17T22:15:12.667
Link: CVE-2024-38826
No data.