Miggo Logo

CVE-2018-1192:
Cloud Foundry UAA SessionID present in Audit Event Logs

8.8

CVSS Score

Basic Information

EPSS Score
-
Published
5/14/2022
Updated
3/1/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.cloudfoundry.identity:cloudfoundry-identity-servermaven< 4.5.54.5.5
org.cloudfoundry.identity:cloudfoundry-identity-servermaven>= 4.6.0, < 4.7.44.7.4
org.cloudfoundry.identity:cloudfoundry-identity-servermaven>= 4.8.0, < 4.8.34.8.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The commit diff shows removal of sessionId handling from UaaAuthenticationDetails.toString() method. The vulnerability stemmed from session IDs being included in audit logs via this toString() implementation. The added test explicitly verifies sessionId exclusion from logs, confirming this was the vulnerable path. No other functions show sessionID handling in the provided diffs.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In *lou* *oun*ry *oun**tion **-r*l**s* v*rsions prior to v***; **-**ploym*nt v*rsions prior to v*.*; U** *.*.x v*rsions prior to *.*.*, *.*.x v*rsions prior to *.*.*, *n* *.*.x v*rsions prior to *.*.*; *n* U**-r*l**s* **.*.x v*rsions prior to **.*, *

Reasoning

T** *ommit *i** s*ows r*mov*l o* s*ssionI* **n*lin* *rom U***ut**nti**tion**t*ils.toStrin*() m*t*o*. T** vuln*r**ility st*mm** *rom s*ssion I*s **in* in*lu*** in *u*it lo*s vi* t*is toStrin*() impl*m*nt*tion. T** ***** t*st *xpli*itly v*ri*i*s s*ssio