CAPI (Cloud Controller) versions prior to 1.101.0 are vulnerable to a denial-of-service attack in which an unauthenticated malicious attacker can send specially-crafted YAML files to certain endpoints, causing the YAML parser to consume excessive CPU and RAM.
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://www.cloudfoundry.org/blog/cve-2020-5423 | vendor advisory |