漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
A path traversal vulnerability was identified in the Cloud Foundry component Cloud Controller that affects cf-release versions prior to v208 and Pivotal Cloud Foundry Elastic Runtime versions prior to 1.4.2. Path traversal is the 'outbreak' of a given directory structure through relative file paths in the user input. It aims at accessing files and directories that are stored outside the web root folder, for disallowed reading or even executing arbitrary system commands. An attacker could use a certain parameter of the file path for instance to inject '../' sequences in order to navigate through the file system. In this particular case a remote authenticated attacker can exploit the identified vulnerability in order to upload arbitrary files to the server running a Cloud Controller instance - outside the isolated application container.
漏洞信息
N/A
漏洞
N/A
漏洞
Pivotal Cloud Foundry Elastic Runtime和cf-release 路径遍历漏洞
漏洞信息
Pivotal Cloud Foundry(PCF)是美国Pivotal Software公司的一套开源的平台即服务(PaaS)云计算平台,它提供容器调度、持续交付和自动化服务部署等功能。Elastic Runtime是PCF的一个运行环境。cf-release是CF的一个发布版本。 Pivotal Cloud Foundry Elastic Runtime 1.4.2之前的版本和Cloud Foundry Runtime cf-release 208之前的版本中的Cloud Controller组件存在
漏洞信息
N/A
漏洞
N/A