Description
An authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulnerable Foreman instances, in a highly privileged context.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0606 | An authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulnerable Foreman instances, in a highly privileged context. |
Github GHSA |
GHSA-gx5g-xcxj-cx2w | smart_proxy_dynflow gem authentication bypass in Foreman remote execution feature |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T09:38:12.833Z
Reserved: 2018-07-27T00:00:00.000Z
Link: CVE-2018-14643
No data.
Status : Modified
Published: 2018-09-21T13:29:00.297
Modified: 2024-11-21T03:49:29.547
Link: CVE-2018-14643
OpenCVE Enrichment
No data.
EUVD
Github GHSA