CAPI (Cloud Controller) versions prior to 1.101.0 are vulnerable to a denial-of-service attack in which an unauthenticated malicious attacker can send specially-crafted YAML files to certain endpoints, causing the YAML parser to consume excessive CPU and RAM.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.cloudfoundry.org/blog/cve-2020-5423 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: pivotal
Published: 2020-12-02T01:55:11.878304Z
Updated: 2024-09-17T03:43:03.193Z
Reserved: 2020-01-03T00:00:00
Link: CVE-2020-5423
Vulnrichment
No data.
NVD
Status : Modified
Published: 2020-12-02T02:15:12.033
Modified: 2024-11-21T05:34:08.647
Link: CVE-2020-5423
Redhat
No data.