Description
A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injection. The highest threat from this vulnerability is to confidentiality, integrity and availability of system. Fixed releases are 2.4.1, 2.5.1, 3.0.0.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-26892 | A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injection. The highest threat from this vulnerability is to confidentiality, integrity and availability of system. Fixed releases are 2.4.1, 2.5.1, 3.0.0. |
References
History
Thu, 10 Apr 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat satellite Utils
|
|
| CPEs | cpe:/a:redhat:satellite_utils:6.11::el7 cpe:/a:redhat:satellite_utils:6.11::el8 |
|
| Vendors & Products |
Redhat satellite Utils
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T17:01:07.414Z
Reserved: 2021-06-07T00:00:00.000Z
Link: CVE-2021-3584
No data.
Status : Modified
Published: 2021-12-23T20:15:11.533
Modified: 2024-11-21T06:21:54.377
Link: CVE-2021-3584
OpenCVE Enrichment
No data.
Weaknesses
EUVD