Описание
An authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulnerable Foreman instances, in a highly privileged context.
Меры по смягчению последствий
Disable Smart Proxy Dynflow by setting the :enabled: option to false in the /etc/foreman-proxy/settings.d/dynflow.yml file.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Satellite 6 | tfm-rubygem-smart_proxy_dynflow_core | Not affected | ||
| Red Hat Satellite 6.3 for RHEL 7 | rubygem-smart_proxy_dynflow | Fixed | RHSA-2018:2733 | 20.09.2018 |
| Red Hat Satellite 6.3 for RHEL 7 | rubygem-smart_proxy_dynflow | Fixed | RHSA-2018:2733 | 20.09.2018 |
Показывать по
Дополнительная информация
Статус:
EPSS
9.8 Critical
CVSS3
Связанные уязвимости
An authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulnerable Foreman instances, in a highly privileged context.
An authentication bypass flaw was found in the smart_proxy_dynflow com ...
smart_proxy_dynflow gem authentication bypass in Foreman remote execution feature
EPSS
9.8 Critical
CVSS3