First published: Fri Jun 20 2014(Updated: )
The Smart-Proxy in Foreman before 1.4.5 and 1.5.x before 1.5.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the path parameter to tftp/fetch_boot_file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
TheForeman Foreman | <=1.4.4 | |
TheForeman Foreman | =1.4.0 | |
TheForeman Foreman | =1.4.1 | |
TheForeman Foreman | =1.4.2 | |
TheForeman Foreman | =1.4.3 | |
TheForeman Foreman | =1.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0007 has been rated as a high severity vulnerability due to its potential to allow remote command execution.
To fix CVE-2014-0007, upgrade Foreman to version 1.4.5 or later, or 1.5.1 or later.
CVE-2014-0007 affects Foreman versions from 1.4.0 to 1.4.4 and version 1.5.0.
CVE-2014-0007 allows attackers to execute arbitrary commands on the server due to improper handling of shell metacharacters.
Yes, CVE-2014-0007 is a web application vulnerability within the Smart-Proxy component of Foreman.