Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Foreman
(Theforeman)Repositories |
• https://github.com/theforeman/foreman
• https://github.com/theforeman/smart-proxy |
#Vulnerabilities | 69 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-08-12 | CVE-2024-7700 | A command injection flaw was found in the "Host Init Config" template in the Foreman application via the "Install Packages" field on the "Register Host" page. This flaw allows an attacker with the necessary privileges to inject arbitrary commands into the configuration, potentially allowing unauthorized command execution during host registration. Although this issue requires user interaction to execute injected commands, it poses a significant risk if an unsuspecting user runs the generated... | Foreman | 6.5 | ||
2017-11-27 | CVE-2017-15100 | An attacker submitting facts to the Foreman server containing HTML can cause a stored XSS on certain pages: (1) Facts page, when clicking on the "chart" button and hovering over the chart; (2) Trends page, when checking the graph for a trend based on a such fact; (3) Statistics page, for facts that are aggregated on this page. | Satellite, Satellite_capsule, Foreman | 6.1 | ||
2015-08-14 | CVE-2015-1816 | Forman before 1.7.4 does not verify SSL certificates for LDAP connections, which allows man-in-the-middle attackers to spoof LDAP servers via a crafted certificate. | Foreman | N/A | ||
2015-08-14 | CVE-2015-1844 | Foreman before 1.7.5 allows remote authenticated users to bypass organization and location restrictions by connecting through the REST API. | Foreman | N/A | ||
2018-04-16 | CVE-2016-9593 | foreman-debug before version 1.15.0 is vulnerable to a flaw in foreman-debug's logging. An attacker with access to the foreman log file would be able to view passwords, allowing them to access those systems. | Satellite, Foreman | 8.8 | ||
2018-08-01 | CVE-2016-8639 | It was found that foreman before 1.13.0 is vulnerable to a stored XSS via an organization or location name. This could allow an attacker with privileges to set the organization or location name to display arbitrary HTML including scripting code within the web interface. | Satellite, Satellite_capsule, Foreman | 5.4 | ||
2018-09-10 | CVE-2016-7077 | foreman before 1.14.0 is vulnerable to an information leak. It was found that Foreman form helper does not authorize options for associated objects. Unauthorized user can see names of such objects if their count is less than 6. | Foreman | 4.3 | ||
2018-09-10 | CVE-2016-7078 | foreman before version 1.15.0 is vulnerable to an information leak through organizations and locations feature. When a user is assigned _no_ organizations/locations, they are able to view all resources instead of none (mirroring an administrator's view). The user's actions are still limited by their assigned permissions, e.g. to control viewing, editing and deletion. | Foreman | 4.3 | ||
2019-08-01 | CVE-2014-8183 | It was found that foreman, versions 1.x.x before 1.15.6, in Satellite 6 did not properly enforce access controls on certain resources. An attacker with access to the API and knowledge of the resource name can access resources in other organizations. | Satellite, Foreman | 7.4 | ||
2013-07-31 | CVE-2013-2113 | The create method in app/controllers/users_controller.rb in Foreman before 1.2.0-RC2 allows remote authenticated users with permissions to create or edit other users to gain privileges by (1) changing the admin flag or (2) assigning an arbitrary role. | Openstack, Foreman | N/A |