SB2018092123 - Multiple vulnerabilities in Foreman
Published: September 21, 2018 Updated: August 8, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2014-0091)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Foreman has improper input validation which could lead to partial Denial of Service
2) Improper Authentication (CVE-ID: CVE-2018-14643)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
An authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulnerable Foreman instances, in a highly privileged context.
Remediation
Install update from vendor's website.
References
- https://access.redhat.com/security/cve/cve-2014-0091
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0091
- https://security-tracker.debian.org/tracker/CVE-2014-0091
- http://www.securityfocus.com/bid/105375
- https://access.redhat.com/errata/RHSA-2018:2733
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14643
- https://github.com/theforeman/smart_proxy_dynflow/pull/54