Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Cloudforms
(Redhat)Repositories |
• https://github.com/paramiko/paramiko
• https://github.com/sinatra/sinatra |
#Vulnerabilities | 48 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2017-08-23 | CVE-2017-11610 | The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups. | Debian_linux, Fedora, Cloudforms, Supervisor | 8.8 | ||
2018-07-27 | CVE-2017-2653 | A number of unused delete routes are present in CloudForms before 5.7.2.1 which can be accessed via GET requests instead of just POST requests. This could allow an attacker to bypass the protect_from_forgery XSRF protection causing the routes to be used. This attack would require additional cross-site scripting or similar attacks in order to execute. | Cloudforms, Cloudforms_management_engine | 6.5 | ||
2018-09-10 | CVE-2016-7071 | It was found that the CloudForms before 5.6.2.2, and 5.7.0.7 did not properly apply permissions controls to VM IDs passed by users. A remote, authenticated attacker could use this flaw to execute arbitrary VMs on systems managed by CloudForms if they know the ID of the VM. | Cloudforms, Cloudforms_management_engine | 8.8 | ||
2018-09-11 | CVE-2016-7047 | A flaw was found in the CloudForms API before 5.6.3.0, 5.7.3.1 and 5.8.1.2. A user with permissions to use the MiqReportResults capability within the API could potentially view data from other tenants or groups to which they should not have access. | Cloudforms, Cloudforms_management_engine | 4.3 | ||
2019-03-27 | CVE-2019-5418 | There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed. | Debian_linux, Fedora, Leap, Cloudforms, Software_collections, Rails | 7.5 | ||
2019-03-27 | CVE-2019-5419 | There is a possible denial of service vulnerability in Action View (Rails) <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 where specially crafted accept headers can cause action view to consume 100% cpu and make the server unresponsive. | Debian_linux, Fedora, Leap, Cloudforms, Software_collections, Rails | 7.5 | ||
2014-03-18 | CVE-2014-0057 | The x_button method in the ServiceController (vmdb/app/controllers/service_controller.rb) in Red Hat CloudForms 3.0 Management Engine 5.2 allows remote attackers to execute arbitrary methods via unspecified vectors. | Cloudforms, Cloudforms_3\.0_management_engine | N/A | ||
2016-04-11 | CVE-2015-7502 | Red Hat CloudForms 3.2 Management Engine (CFME) 5.4.4 and CloudForms 4.0 Management Engine (CFME) 5.5.0 do not properly encrypt data in the backend PostgreSQL database, which might allow local users to obtain sensitive data and consequently gain privileges by leveraging access to (1) database exports or (2) log files. | Cloudforms, Cloudforms_management_engine | 5.1 | ||
2018-02-28 | CVE-2017-12191 | A flaw was found in the CloudForms account configuration when using VMware. By default, a shared account is used that has privileged access to VMRC (VMWare Remote Console) functions that may not be appropriate for users of CloudForms (and thus this account). An attacker could use this vulnerability to view and make changes to settings in the VMRC and virtual machines controlled by it that they should not have access to. | Cloudforms | 7.4 | ||
2018-07-27 | CVE-2017-2639 | It was found that CloudForms does not verify that the server hostname matches the domain name in the certificate when using a custom CA and communicating with Red Hat Virtualization (RHEV) and OpenShift. This would allow an attacker to spoof RHEV or OpenShift systems and potentially harvest sensitive information from CloudForms. | Cloudforms, Cloudforms_management_engine | 7.5 |