CVE-2019-3793

9.8 CRITICAL

📋 TL;DR

CVE-2019-3793 is a critical vulnerability in Pivotal Apps Manager where the invitation service uses unencrypted HTTP instead of HTTPS. This allows unauthenticated attackers on the same network to intercept credentials used for invitation requests. Affected versions are Pivotal Apps Manager releases 665.0.x before 665.0.28, 666.0.x before 666.0.21, and 667.0.x before 667.0.7.

💻 Affected Systems

Products:
  • Pivotal Apps Manager
Versions: 665.0.x prior to 665.0.28, 666.0.x prior to 666.0.21, 667.0.x prior to 667.0.7
Operating Systems: All platforms running Pivotal Apps Manager
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration where invitation service uses HTTP. Requires network access to intercept traffic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative credentials, leading to complete compromise of the Pivotal Apps Manager instance and potentially the underlying Pivotal Cloud Foundry platform.

🟠

Likely Case

Attackers intercept invitation credentials, allowing them to create unauthorized user accounts, access sensitive application data, or escalate privileges within the platform.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to credential exposure requiring immediate rotation and investigation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to intercept unencrypted HTTP traffic. No authentication needed to observe network traffic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 665.0.28, 666.0.21, or 667.0.7

Vendor Advisory: https://pivotal.io/security/cve-2019-3793

Restart Required: Yes

Instructions:

1. Upgrade Pivotal Apps Manager to version 665.0.28, 666.0.21, or 667.0.7 or higher. 2. Restart the Apps Manager service. 3. Verify the invitation service now uses HTTPS.

🔧 Temporary Workarounds

Force HTTPS for invitation service

all

Configure network rules or application settings to force HTTPS for all invitation service communications

Configure load balancer or reverse proxy to redirect HTTP to HTTPS for invitation endpoints

Network segmentation

all

Isolate Apps Manager network to prevent unauthorized access to invitation service traffic

Implement VLAN segmentation or firewall rules to restrict access to Apps Manager network

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Apps Manager from untrusted networks
  • Deploy network monitoring and IDS/IPS to detect credential interception attempts

🔍 How to Verify

Check if Vulnerable:

Check Apps Manager version via management interface or API. If version is 665.0.x < 665.0.28, 666.0.x < 666.0.21, or 667.0.x < 667.0.7, system is vulnerable.

Check Version:

Check Pivotal Ops Manager dashboard or use 'cf curl /v2/info' to verify platform version

Verify Fix Applied:

Verify Apps Manager version is 665.0.28+, 666.0.21+, or 667.0.7+. Confirm invitation service endpoints use HTTPS.

📡 Detection & Monitoring

Log Indicators:

  • Unusual invitation requests from unexpected IPs
  • Multiple failed authentication attempts following invitation

Network Indicators:

  • HTTP traffic to invitation service endpoints
  • Unencrypted credential transmission in network captures

SIEM Query:

source="apps-manager" AND (http_method="POST" AND uri="/invitations" AND protocol="HTTP")

🔗 References

📤 Share & Export