Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-3584

Опубликовано: 23 дек. 2021
Источник: nvd
CVSS3: 7.2
CVSS2: 9
EPSS Низкий

Описание

A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injection. The highest threat from this vulnerability is to confidentiality, integrity and availability of system. Fixed releases are 2.4.1, 2.5.1, 3.0.0.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:*
Версия до 2.4.1 (исключая)
cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:*
Версия от 2.5.0 (включая) до 2.5.1 (исключая)
cpe:2.3:a:theforeman:foreman:3.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:theforeman:foreman:3.0.0:rc2:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:o:redhat:satellite:6.0:*:*:*:*:*:*:*

EPSS

Процентиль: 64%
0.00476
Низкий

7.2 High

CVSS3

9 Critical

CVSS2

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 7.2
redhat
больше 4 лет назад

A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injection. The highest threat from this vulnerability is to confidentiality, integrity and availability of system. Fixed releases are 2.4.1, 2.5.1, 3.0.0.

CVSS3: 7.2
debian
около 4 лет назад

A server side remote code execution vulnerability was found in Foreman ...

github
около 4 лет назад

A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injection. The highest threat from this vulnerability is to confidentiality, integrity and availability of system. Fixed releases are 2.4.1, 2.5.1, 3.0.0.

EPSS

Процентиль: 64%
0.00476
Низкий

7.2 High

CVSS3

9 Critical

CVSS2

Дефекты

CWE-78