When deploying Cloud Foundry together with the haproxy-boshrelease and using a non default configuration, it might be possible to craft HTTP requests that bypass mTLS authentication to Cloud Foundry applications.
You are affected if you have route-services enabled in routing-release and have configured the haproxy-boshrelease property “ha_proxy.forwarded_client_cert” to “forward_only_if_route_service”.
References
Configurations
No configuration.
History
21 Nov 2024, 09:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cloudfoundry.org/blog/cve-2024-37082-mtls-bypass/ - |
12 Jul 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
12 Jul 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
Summary | (en) When deploying Cloud Foundry together with the haproxy-boshrelease and using a non default configuration, it might be possible to craft HTTP requests that bypass mTLS authentication to Cloud Foundry applications. You are affected if you have route-services enabled in routing-release and have configured the haproxy-boshrelease property “ha_proxy.forwarded_client_cert” to “forward_only_if_route_service”. |
03 Jul 2024, 12:53
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
03 Jul 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-03 06:15
Updated : 2024-11-21 09:23
NVD link : CVE-2024-37082
Mitre link : CVE-2024-37082
CVE.ORG link : CVE-2024-37082
JSON object : View
Products Affected
No product.
CWE
CWE-290
Authentication Bypass by Spoofing