Latest theforeman foreman Vulnerabilities

Foreman: world readable file containing secrets
Theforeman Foreman<3.8.0
Redhat Satellite=6.0
An arbitrary code execution flaw was found in Foreman. This issue may allow an admin user to execute arbitrary code on the underlying operating system by setting global parameters with a YAML payload.
Theforeman Foreman<3.8.0
Redhat Satellite>=6.0
An admin user on Foreman can bypass safe mode in templates and execute arbitrary code via the Report Templates function. When changing the "template" JSON value in the POST request, an attacker can ex...
Theforeman Foreman
Redhat Satellite>=6.13<6.13.3
Redhat Enterprise Linux=8.0
A command injection flaw was found in foreman. This flaw allows an authenticated user with admin privileges on the foreman instance to transpile commands through CoreOS and Fedora CoreOS configuration...
rubygems/foreman<=3.8.0
Redhat Satellite=6.0
Theforeman Foreman
A credential leak vulnerability was found in Foreman through Azure Compute Profile. This flaw exposes the compute profile credentials to the all authenticated users with "view_compute_profiles" permis...
Theforeman Foreman>=1.6.0
Redhat Satellite=6.0
A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injectio...
Theforeman Foreman<2.4.1
Theforeman Foreman>=2.5.0<2.5.1
Theforeman Foreman=3.0.0-rc1
Theforeman Foreman=3.0.0-rc2
Redhat Satellite=6.0
Theforeman Foreman<2.3.4
A smart proxy that provides a restful API to various sub-systems of the Foreman is affected by the flaw which can cause a Man-in-the-Middle attack. The FreeIPA module of Foreman smart proxy does not c...
redhat/foreman<2.5.0
Theforeman Foreman<2.5.0
A password leak was identified on Foreman project which will expose password in plaintext through Foreman Datacenter plugin.
Theforeman Foreman
A flaw was found where the Plaintext Candlepin password is disclosed while updating Red Hat Satellite through the satellite-installer. This flaw allows an attacker with sufficiently high privileges, s...
Theforeman Foreman<1.24.1.22
redhat/foreman-installer<1.24.1.22
Foreman has improper input validation which could lead to partial Denial of Service
Theforeman Foreman
debian
In Foreman it was discovered that the delete compute resource operation, when executed from the Foreman API, leads to the disclosure of the plaintext password or token for the affected compute resourc...
Theforeman Foreman>=1.20.0<1.20.3
Theforeman Foreman>=1.21.0<1.21.1
Redhat Satellite=6.0
A cross-site scripting (XSS) flaw was found in the foreman component of satellite. An attacker with privilege to create entries using the Hosts, Monitor, Infrastructure, or Administer Menus is able to...
Theforeman Foreman<1.18.3
Theforeman Foreman>=1.19.0<1.19.1
Theforeman Foreman=1.20.0-rc1
Theforeman Foreman=1.20.0-rc2
A flaw was found in foreman from versions 1.18. A stored cross-site scripting vulnerability exists due to an improperly escaped HTML code in the breadcrumbs bar. This allows a user with permissions to...
Theforeman Foreman=1.18.0
An authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulne...
Theforeman Foreman
foreman before version 1.15.0 is vulnerable to an information leak through organizations and locations feature. When a user is assigned _no_ organizations/locations, they are able to view all resource...
Theforeman Foreman=1.15.0
A vulnerability was found in foreman 1.14.0. When creating an organization or location in Foreman, if the name contains HTML then the second step of the wizard (/organizations/id/step2) will render th...
Theforeman Foreman=1.14.0
A flaw was found in foreman 1.5.1. The remote execution plugin runs commands on hosts over SSH from the Foreman web UI. When a job is submitted that contains HTML tags, the console output shown in the...
Theforeman Foreman=1.5.1
foreman before version 1.16.0 is vulnerable to a stored XSS in organizations/locations assignment to hosts. Exploiting this requires a user to actively assign hosts to an organization that contains ht...
Theforeman Foreman<1.16.0

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203