Version 4.19.2

UAA server

No description available.

Install Instructions

mvn install cloudfoundry-identity-server
Language Java

Find UAA server vulnerabilities in your supply chain.

Scan for Free

UAA server Vulnerabilities

Sort by
icon CVE (Latest)
  • icon CVE (Latest)
  • icon CVE (Oldest)
  • icon CVSS Score (Highest)
  • icon CVSS Score (Lowest)
CVE question mark icon CVSS Score question mark icon CWE(s) question mark icon EPSS Score question mark icon EPSS % question mark icon Impacted Versions
CVE-2016-0781 Medium 6.1 CWE-79 0.00089 0.39462
  • 3.0.0–3.2.0
CVE-2016-3084 High 8.1 CWE-307, CWE-264 0.00228 0.6057
  • 3.0.0–3.3.0
CVE-2016-4468 High 8.8 CWE-89 0.00099 0.42103
  • 3.0.0–3.4.0
CVE-2016-5016 Medium 5.9 CWE-298, CWE-295 0.00297 0.68963
  • 3.0.0–3.4.0
CVE-2016-6636 Medium 5.3 CWE-601 0.00168 0.53898
  • 3.0.0–3.4.3
CVE-2016-6637 High 9.6 CWE-352 0.0009 0.39889
  • 3.0.0–3.6.0
CVE-2016-6651 High 8.8 CWE-264 0.00167 0.53807
  • 3.0.0–3.7.0
CVE-2017-4960 High 7.5 CWE-400 0.00083 0.37142
  • 3.0.0–3.10.0
CVE-2017-4963 High 8.1 CWE-384 0.00245 0.63699
  • 3.0.0–3.9.0
CVE-2017-4972 High 7.5 CWE-89 0.00137 0.49676
  • 3.0.0–3.13.0
CVE-2017-4973 High 8.8 CWE-265, CWE-264, CWE-269 0.00104 0.43469
  • 3.0.0–3.13.0
CVE-2017-4974 Medium 6.5 CWE-89 0.00051 0.22134
  • 3.0.0–3.15.0
CVE-2017-4991 High 7.2 CWE-269 0.00104 0.43469
  • 3.0.0–3.16.0
CVE-2017-4992 High 9.8 CWE-269 0.00245 0.63699
  • 4.1.0
  • 3.0.0–3.20.0
CVE-2017-8031 Medium 5.3 0.00068 0.31619
  • 4.1.0–4.7.0
  • 3.0.0–3.20.0
CVE-2017-8032 Medium 6.6 CWE-269 0.00102 0.4279
  • 4.1.0–4.3.0
  • 3.0.0–3.19.0
CVE-2018-11041 Medium 6.1 CWE-601 0.00089 0.39177
  • 4.1.0–4.18.0
  • 3.0.0–3.20.0
CVE-2018-11047 High 7.5 CWE-863 0.00085 0.3778
  • 4.1.0–4.19.0
  • 3.0.0–3.20.0
CVE-2018-1190 Medium 6.1 CWE-79 0.00058 0.26284
  • 3.0.0–3.20.0
CVE-2018-1192 High 8.8 CWE-200 0.00104 0.43469
  • 4.1.0–4.8.2
  • 3.0.0–3.20.0
CVE-2018-15761 High 9.9 CWE-1259 0.00192 0.56852
  • 4.1.0–4.22.0
  • 3.0.0–3.20.0
CVE-2016-0732 High 8.8 CWE-264, CWE-269 0.00188 0.56299
  • 3.0.0
CVE-2018-1262 High 7.2 CWE-265 0.00118 0.46369
  • 4.12.0–4.13.3

UAA server Vulnerability Remediation Guidance

CVE Description Full list of Impacted Versions Fix
CVE-2018-15761 Cloud Foundry UAA release, versions prior to v64.0, and UAA, versions prior to 4.23.0, contains a validation error which allows for privilege escalation. A remote authenticated user may modify the url and content of a consent page to gain a token with arbitrary scopes that escalates their privileges. 3.0.1, 3.3.0.1, 3.2.0, 3.2.1, 3.3.0, 3.4.0, 3.0.0, 3.1.0 (Show all) Major → 4.23.0
CVE-2018-1262 Cloud Foundry Foundation UAA, versions 4.12.X and 4.13.X, introduced a feature which could allow privilege escalation across identity zones for clients performing offline validation. A zone administrator could configure their zone to issue tokens which impersonate another zone, granting up to admin privileges in the impersonated zone for clients performing offline token validation. 4.13.1, 4.13.3, 4.12.0, 4.13.0, 4.12.1 Minor → 4.23.0
CVE-2018-1192 In Cloud Foundry Foundation cf-release versions prior to v285; cf-deployment versions prior to v1.7; UAA 4.5.x versions prior to 4.5.5, 4.8.x versions prior to 4.8.3, and 4.7.x versions prior to 4.7.4; and UAA-release 45.7.x versions prior to 45.7, 52.7.x versions prior to 52.7, and 53.3.x versions prior to 53.3, the SessionID is logged in audit event logs. An attacker can use the SessionID to impersonate a logged-in user. 3.0.1, 3.3.0.1, 3.2.0, 3.2.1, 3.3.0, 3.4.0, 3.0.0, 3.1.0 (Show all) Major → 4.23.0
CVE-2018-1190 An issue was discovered in these Pivotal Cloud Foundry products: all versions prior to cf-release v270, UAA v3.x prior to v3.20.2, and UAA bosh v30.x versions prior to v30.8 and all other versions prior to v45.0. A cross-site scripting (XSS) attack is possible in the clientId parameter of a request to the UAA OpenID Connect check session iframe endpoint used for single logout session management. 3.0.1, 3.3.0.1, 3.2.0, 3.2.1, 3.3.0, 3.4.0, 3.0.0, 3.1.0 (Show all) Major → 4.23.0
CVE-2018-11047 Cloud Foundry UAA, versions 4.19 prior to 4.19.2 and 4.12 prior to 4.12.4 and 4.10 prior to 4.10.2 and 4.7 prior to 4.7.6 and 4.5 prior to 4.5.7, incorrectly authorizes requests to admin endpoints by accepting a valid refresh token in lieu of an access token. Refresh tokens by design have a longer expiration time than access tokens, allowing the possessor of a refresh token to authenticate longer than expected. This affects the administrative endpoints of the UAA. i.e. /Users, /Groups, etc. However, if the user has been deleted or had groups removed, or the client was deleted, the refresh token will no longer be valid. 3.0.1, 3.3.0.1, 3.2.0, 3.2.1, 3.3.0, 3.4.0, 3.0.0, 3.1.0 (Show all) Major → 4.23.0
CVE-2018-11041 Cloud Foundry UAA, versions later than 4.6.0 and prior to 4.19.0 except 4.10.1 and 4.7.5 and uaa-release versions later than v48 and prior to v60 except v55.1 and v52.9, does not validate redirect URL values on a form parameter used for internal UAA redirects on the login page, allowing open redirects. A remote attacker can craft a malicious link that, when clicked, will redirect users to arbitrary websites after a successful login attempt. 3.0.1, 3.3.0.1, 3.2.0, 3.2.1, 3.3.0, 3.4.0, 3.0.0, 3.1.0 (Show all) Major → 4.23.0
CVE-2017-8032 In Cloud Foundry cf-release versions prior to v264; UAA release all versions of UAA v2.x.x, 3.6.x versions prior to v3.6.13, 3.9.x versions prior to v3.9.15, 3.20.x versions prior to v3.20.0, and other versions prior to v4.4.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.17, 24.x versions prior to v24.12. 30.x versions prior to 30.5, and other versions prior to v41, zone administrators are allowed to escalate their privileges when mapping permissions for an external provider. 3.0.1, 3.3.0.1, 3.2.0, 3.2.1, 3.3.0, 3.4.0, 3.0.0, 3.1.0 (Show all) Major → 4.23.0
CVE-2017-8031 An issue was discovered in Cloud Foundry Foundation cf-release (all versions prior to v279) and UAA (30.x versions prior to 30.6, 45.x versions prior to 45.4, 52.x versions prior to 52.1). In some cases, the UAA allows an authenticated user for a particular client to revoke client tokens for other users on the same client. This occurs only if the client is using opaque tokens or JWT tokens validated using the check_token endpoint. A malicious actor could cause denial of service. 3.0.1, 3.3.0.1, 3.2.0, 3.2.1, 3.3.0, 3.4.0, 3.0.0, 3.1.0 (Show all) Major → 4.23.0
CVE-2017-4992 An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v261; UAA release 2.x versions prior to v2.7.4.17, 3.6.x versions prior to v3.6.11, 3.9.x versions prior to v3.9.13, and other versions prior to v4.2.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.15, 24.x versions prior to v24.10, 30.x versions prior to 30.3, and other versions prior to v37. There is privilege escalation (arbitrary password reset) with user invitations. 3.0.1, 3.3.0.1, 3.2.0, 3.2.1, 3.3.0, 3.4.0, 3.0.0, 3.1.0 (Show all) Major → 4.23.0
CVE-2017-4991 An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v260; UAA release 2.x versions prior to v2.7.4.16, 3.6.x versions prior to v3.6.10, 3.9.x versions prior to v3.9.12, and other versions prior to v3.17.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.14, 24.x versions prior to v24.9, 30.x versions prior to 30.2, and other versions prior to v36. Privileged users in one zone are allowed to perform a password reset for users in a different zone. 3.0.1, 3.3.0.1, 3.2.0, 3.2.1, 3.3.0, 3.4.0, 3.0.0, 3.1.0 (Show all) Major → 4.23.0
CVE-2017-4974 An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v258; UAA release 2.x versions prior to v2.7.4.15, 3.6.x versions prior to v3.6.9, 3.9.x versions prior to v3.9.11, and other versions prior to v3.16.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.13, 24.x versions prior to v24.8, and other versions prior to v30.1. An authorized user can use a blind SQL injection attack to query the contents of the UAA database, aka "Blind SQL Injection with privileged UAA endpoints." 3.0.1, 3.3.0.1, 3.2.0, 3.2.1, 3.3.0, 3.4.0, 3.0.0, 3.1.0 (Show all) Major → 4.23.0
CVE-2017-4973 An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v257; UAA release 2.x versions prior to v2.7.4.14, 3.6.x versions prior to v3.6.8, 3.9.x versions prior to v3.9.10, and other versions prior to v3.15.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.12, 24.x versions prior to v24.7, and other versions prior to v30. A vulnerability has been identified with the groups endpoint in UAA allowing users to elevate their privileges. 3.0.1, 3.3.0.1, 3.2.0, 3.2.1, 3.3.0, 3.4.0, 3.0.0, 3.1.0 (Show all) Major → 4.23.0
CVE-2017-4972 An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v257; UAA release 2.x versions prior to v2.7.4.14, 3.6.x versions prior to v3.6.8, 3.9.x versions prior to v3.9.10, and other versions prior to v3.15.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.12, 24.x versions prior to v24.7, and other versions prior to v30. An attacker can use a blind SQL injection attack to query the contents of the UAA database. 3.0.1, 3.3.0.1, 3.2.0, 3.2.1, 3.3.0, 3.4.0, 3.0.0, 3.1.0 (Show all) Major → 4.23.0
CVE-2017-4963 An issue was discovered in Cloud Foundry Foundation Cloud Foundry release v252 and earlier versions, UAA stand-alone release v2.0.0 - v2.7.4.12 & v3.0.0 - v3.11.0, and UAA bosh release v26 & earlier versions. UAA is vulnerable to session fixation when configured to authenticate against external SAML or OpenID Connect based identity providers. 3.0.1, 3.3.0.1, 3.2.0, 3.2.1, 3.3.0, 3.4.0, 3.0.0, 3.1.0 (Show all) Major → 4.23.0
CVE-2017-4960 An issue was discovered in Cloud Foundry release v247 through v252, UAA stand-alone release v3.9.0 through v3.11.0, and UAA Bosh Release v21 through v26. There is a potential to subject the UAA OAuth clients to a denial of service attack. 3.0.1, 3.3.0.1, 3.2.0, 3.2.1, 3.3.0, 3.4.0, 3.0.0, 3.1.0 (Show all) Major → 4.23.0
CVE-2016-6651 The UAA /oauth/token endpoint in Pivotal Cloud Foundry (PCF) before 243; UAA 2.x before 2.7.4.8, 3.x before 3.3.0.6, and 3.4.x before 3.4.5; UAA BOSH before 11.7 and 12.x before 12.6; Elastic Runtime before 1.6.40, 1.7.x before 1.7.21, and 1.8.x before 1.8.2; and Ops Manager 1.7.x before 1.7.13 and 1.8.x before 1.8.1 allows remote authenticated users to gain privileges by leveraging possession of a token. 3.0.1, 3.3.0.1, 3.2.0, 3.2.1, 3.3.0, 3.4.0, 3.0.0, 3.1.0 (Show all) Major → 4.23.0
CVE-2016-6637 Multiple cross-site request forgery (CSRF) vulnerabilities in Pivotal Cloud Foundry (PCF) before 242; UAA 2.x before 2.7.4.7, 3.x before 3.3.0.5, and 3.4.x before 3.4.4; UAA BOSH before 11.5 and 12.x before 12.5; Elastic Runtime before 1.6.40, 1.7.x before 1.7.21, and 1.8.x before 1.8.2; and Ops Manager 1.7.x before 1.7.13 and 1.8.x before 1.8.1 allow remote attackers to hijack the authentication of unspecified victims for requests that approve or deny a scope via a profile or authorize approval page. 3.0.1, 3.3.0.1, 3.2.0, 3.2.1, 3.3.0, 3.4.0, 3.0.0, 3.1.0 (Show all) Major → 4.23.0
CVE-2016-6636 The OAuth authorization implementation in Pivotal Cloud Foundry (PCF) before 242; UAA 2.x before 2.7.4.7, 3.x before 3.3.0.5, and 3.4.x before 3.4.4; UAA BOSH before 11.5 and 12.x before 12.5; Elastic Runtime before 1.6.40, 1.7.x before 1.7.21, and 1.8.x before 1.8.1; and Ops Manager 1.7.x before 1.7.13 and 1.8.x before 1.8.1 mishandles redirect_uri subdomains, which allows remote attackers to obtain implicit access tokens via a modified subdomain. 3.0.1, 3.3.0.1, 3.2.0, 3.2.1, 3.3.0, 3.4.0, 3.0.0, 3.1.0 (Show all) Major → 4.23.0
CVE-2016-5016 Pivotal Cloud Foundry 239 and earlier, UAA (aka User Account and Authentication Server) 3.4.1 and earlier, UAA release 12.2 and earlier, PCF (aka Pivotal Cloud Foundry) Elastic Runtime 1.6.x before 1.6.35, and PCF Elastic Runtime 1.7.x before 1.7.13 does not validate if a certificate is expired. 3.0.1, 3.3.0.1, 3.2.0, 3.2.1, 3.3.0, 3.4.0, 3.0.0, 3.1.0 (Show all) Major → 4.23.0
CVE-2016-4468 SQL injection vulnerability in Pivotal Cloud Foundry (PCF) before 238; UAA 2.x before 2.7.4.4, 3.x before 3.3.0.2, and 3.4.x before 3.4.1; UAA BOSH before 11.2 and 12.x before 12.2; Elastic Runtime before 1.6.29 and 1.7.x before 1.7.7; and Ops Manager 1.7.x before 1.7.8 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors. 3.0.1, 3.3.0.1, 3.2.0, 3.2.1, 3.3.0, 3.4.0, 3.0.0, 3.1.0 Major → 4.23.0
CVE-2016-3084 The UAA reset password flow in Cloud Foundry release v236 and earlier versions, UAA release v3.3.0 and earlier versions, all versions of Login-server, UAA release v10 and earlier versions and Pivotal Elastic Runtime versions prior to 1.7.2 is vulnerable to a brute force attack due to multiple active codes at a given time. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected. 3.0.1, 3.2.0, 3.2.1, 3.3.0, 3.0.0, 3.1.0 Major → 4.23.0
CVE-2016-0781 The UAA OAuth approval pages in Cloud Foundry v208 to v231, Login-server v1.6 to v1.14, UAA v2.0.0 to v2.7.4.1, UAA v3.0.0 to v3.2.0, UAA-Release v2 to v7 and Pivotal Elastic Runtime 1.6.x versions prior to 1.6.20 are vulnerable to an XSS attack by specifying malicious java script content in either the OAuth scopes (SCIM groups) or SCIM group descriptions. 3.0.1, 3.2.0, 3.0.0, 3.1.0 Major → 4.23.0
CVE-2016-0732 The identity zones feature in Pivotal Cloud Foundry 208 through 229; UAA 2.0.0 through 2.7.3 and 3.0.0; UAA-Release 2 through 4, when configured with multiple identity zones; and Elastic Runtime 1.6.0 through 1.6.13 allows remote authenticated users with privileges in one zone to gain privileges and perform operations on a different zone via unspecified vectors. 3.0.0 Major → 4.23.0

Instantly see if these UAA server vulnerabilities affect your code.

Scan for Free

Dependencies

Packages using versions of UAA server affected by its vulnerabilities

Dependent Packages
org.cloudfoundry.identity:cloudfoundry-identity-model:4.19.2
org.apache.tomcat:tomcat-jdbc:8.5.23
javax.mail:mail:1.4.7
commons-logging:commons-logging:1.2
com.jayway.jsonpath:json-path:2.4.0
com.google.zxing:javase:3.3.1
org.springframework:spring-beans:4.3.17.RELEASE
org.springframework:spring-context:4.3.17.RELEASE
org.springframework:spring-tx:4.3.17.RELEASE
org.springframework:spring-jdbc:4.3.17.RELEASE
org.springframework:spring-web:4.3.17.RELEASE
org.springframework:spring-context-support:4.3.17.RELEASE
org.springframework.security:spring-security-core:4.2.6.RELEASE
org.springframework.security:spring-security-jwt:1.0.8.RELEASE
org.apache.httpcomponents:httpclient:4.5.3
org.springframework.security:spring-security-openid:4.2.6.RELEASE
org.springframework.security:spring-security-web:4.2.6.RELEASE
org.springframework.security.extensions:spring-security-saml2-core:1.0.4.RELEASE
org.springframework.security.oauth:spring-security-oauth2:2.0.15.RELEASE
org.bouncycastle:bcprov-jdk15on:1.59
org.bouncycastle:bcpkix-jdk15on:1.59
com.google.guava:guava:24.1.1-jre
org.aspectj:aspectjrt:1.8.12
org.thymeleaf:thymeleaf-spring4:3.0.6.RELEASE
nz.net.ultraq.thymeleaf:thymeleaf-layout-dialect:2.3.0
org.thymeleaf.extras:thymeleaf-extras-springsecurity4:3.0.2.RELEASE
com.unboundid.product.scim:scim-sdk:1.8.18
org.hibernate:hibernate-validator:4.3.2.Final
org.flywaydb:flyway-core:4.2.0
org.mariadb.jdbc:mariadb-java-client:2.2.0
com.microsoft.sqlserver:mssql-jdbc:6.2.2.jre8
org.hsqldb:hsqldb:2.3.1
org.yaml:snakeyaml:1.18
org.springframework.security:spring-security-ldap:4.2.6.RELEASE
org.springframework.ldap:spring-ldap-core:2.3.2.RELEASE
org.springframework.ldap:spring-ldap-core-tiger:2.3.2.RELEASE
org.apache.directory.api:api-ldap-model:1.0.0
org.passay:passay:1.2.0
com.warrenstrange:googleauth:1.1.2
javax.servlet:javax.servlet-api:3.1.0