{"containers":{"cna":{"affected":[{"product":"Pivotal Operations Manager","vendor":"Pivotal Cloud Foundry","versions":[{"lessThan":"2.0.24","status":"affected","version":"2.0.x","versionType":"custom"},{"lessThan":"2.1.15","status":"affected","version":"2.1.x","versionType":"custom"},{"lessThan":"2.2.7","status":"affected","version":"2.2.x","versionType":"custom"},{"lessThan":"2.3.1","status":"affected","version":"2.3.x","versionType":"custom"}]}],"datePublic":"2018-10-29T00:00:00.000Z","descriptions":[{"lang":"en","value":"Pivotal Operations Manager, versions 2.0.x prior to 2.0.24, versions 2.1.x prior to 2.1.15, versions 2.2.x prior to 2.2.7, and versions 2.3.x prior to 2.3.1, grants all users a scope which allows for privilege escalation. A remote malicious user who has been authenticated may create a new client with administrator privileges for Opsman."}],"metrics":[{"cvssV3_0":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":9,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","version":"3.0"}}],"problemTypes":[{"descriptions":[{"description":"Improper Authorization","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-11-02T21:57:01.000Z","orgId":"c550e75a-17ff-4988-97f0-544cde3820fe","shortName":"dell"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://pivotal.io/security/cve-2018-15762"}],"source":{"discovery":"UNKNOWN"},"title":"Pivotal Operations Manager gives all users heightened privileges","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security_alert@emc.com","DATE_PUBLIC":"2018-10-29T07:00:00.000Z","ID":"CVE-2018-15762","STATE":"PUBLIC","TITLE":"Pivotal Operations Manager gives all users heightened privileges"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Pivotal Operations Manager","version":{"version_data":[{"affected":"<","version_affected":"<","version_name":"2.0.x","version_value":"2.0.24"},{"affected":"<","version_affected":"<","version_name":"2.1.x","version_value":"2.1.15"},{"affected":"<","version_affected":"<","version_name":"2.2.x","version_value":"2.2.7"},{"affected":"<","version_affected":"<","version_name":"2.3.x","version_value":"2.3.1"}]}}]},"vendor_name":"Pivotal Cloud Foundry"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Pivotal Operations Manager, versions 2.0.x prior to 2.0.24, versions 2.1.x prior to 2.1.15, versions 2.2.x prior to 2.2.7, and versions 2.3.x prior to 2.3.1, grants all users a scope which allows for privilege escalation. A remote malicious user who has been authenticated may create a new client with administrator privileges for Opsman."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":9,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Improper Authorization"}]}]},"references":{"reference_data":[{"name":"https://pivotal.io/security/cve-2018-15762","refsource":"CONFIRM","url":"https://pivotal.io/security/cve-2018-15762"}]},"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T10:01:54.588Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://pivotal.io/security/cve-2018-15762"}]}]},"cveMetadata":{"assignerOrgId":"c550e75a-17ff-4988-97f0-544cde3820fe","assignerShortName":"dell","cveId":"CVE-2018-15762","datePublished":"2018-11-02T22:00:00.000Z","dateReserved":"2018-08-23T00:00:00.000Z","dateUpdated":"2024-09-16T18:54:15.856Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}