Описание
Smart Proxy (aka Smart-Proxy and foreman-proxy) in Foreman before 1.5.4 and 1.6.x before 1.6.2 does not validate SSL certificates, which allows remote attackers to bypass intended authentication and execute arbitrary API requests via a request without a certificate.
Smart Proxy (aka Smart-Proxy and foreman-proxy) in Foreman before 1.5.4 and 1.6.x before 1.6.2 does not validate SSL certificates, which allows remote attackers to bypass intended authentication and execute arbitrary API requests via a request without a certificate.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-3691
- https://github.com/theforeman/smart-proxy/pull/217
- https://access.redhat.com/errata/RHBA-2015:0054
- https://access.redhat.com/errata/RHSA-2015:0287
- https://access.redhat.com/errata/RHSA-2015:0288
- https://access.redhat.com/security/cve/CVE-2014-3691
- https://bugzilla.redhat.com/show_bug.cgi?id=1150879
- https://groups.google.com/forum/#!topic/foreman-announce/jXC5ixybjqo
- https://groups.google.com/forum/#%21topic/foreman-announce/jXC5ixybjqo
- http://projects.theforeman.org/issues/7822
- http://rhn.redhat.com/errata/RHSA-2015-0287.html
- http://rhn.redhat.com/errata/RHSA-2015-0288.html
EPSS
CVE ID
Связанные уязвимости
Smart Proxy (aka Smart-Proxy and foreman-proxy) in Foreman before 1.5.4 and 1.6.x before 1.6.2 does not validate SSL certificates, which allows remote attackers to bypass intended authentication and execute arbitrary API requests via a request without a certificate.
Smart Proxy (aka Smart-Proxy and foreman-proxy) in Foreman before 1.5.4 and 1.6.x before 1.6.2 does not validate SSL certificates, which allows remote attackers to bypass intended authentication and execute arbitrary API requests via a request without a certificate.
EPSS