Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-14643

Опубликовано: 20 сент. 2018
Источник: redhat
CVSS3: 9.8
EPSS Низкий

Описание

An authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulnerable Foreman instances, in a highly privileged context.

Меры по смягчению последствий

Disable Smart Proxy Dynflow by setting the :enabled: option to false in the /etc/foreman-proxy/settings.d/dynflow.yml file.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Satellite 6tfm-rubygem-smart_proxy_dynflow_coreNot affected
Red Hat Satellite 6.3 for RHEL 7rubygem-smart_proxy_dynflowFixedRHSA-2018:273320.09.2018
Red Hat Satellite 6.3 for RHEL 7rubygem-smart_proxy_dynflowFixedRHSA-2018:273320.09.2018

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=1629063smart_proxy_dynflow: Authentication bypass in Foreman remote execution feature

EPSS

Процентиль: 92%
0.08948
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
больше 7 лет назад

An authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulnerable Foreman instances, in a highly privileged context.

CVSS3: 9.8
debian
больше 7 лет назад

An authentication bypass flaw was found in the smart_proxy_dynflow com ...

CVSS3: 9.8
github
больше 7 лет назад

smart_proxy_dynflow gem authentication bypass in Foreman remote execution feature

EPSS

Процентиль: 92%
0.08948
Низкий

9.8 Critical

CVSS3