First published: Wed Apr 30 2014(Updated: )
Jan Rusnacko of Red Hat reports: current CFME code contains dangerous send in cfme/vmdb/app/controllers/application_controller/performance.rb : 747: p_rpt.where_clause[2] = @perf_record.send(@perf_options[:parent].underscore).id This calls .send method on @perf_record, with argument @perf_options[:parent], which is supplied by user: 29: @perf_options[:parent] = params[:compare_to].blank? ? nil : params[:compare_to] if params.has_key?(:compare_to)
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat CloudForms Management Engine 3.0.2 | =5.2.1 | |
Red Hat CloudForms Management Engine 3.0.2 | =5.2.2 | |
Red Hat CloudForms Management Engine 3.0.2 | =5.2.3 | |
Red Hat CloudForms Management Engine 3.0.2 | =5.2.4 | |
Red Hat CloudForms Management Engine 3.0.2 | <=5.2.5 | |
Red Hat CloudForms Management Engine | =5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3642 is classified as a medium severity vulnerability.
To remediate CVE-2014-3642, update Red Hat CloudForms Management Engine to version 5.2.5 or later.
CVE-2014-3642 affects Red Hat CloudForms Management Engine versions 5.2, 5.2.1, 5.2.2, 5.2.3, 5.2.4, and 5.2.5.
CVE-2014-3642 is a code execution vulnerability that arises from unsafe use of the send method.
CVE-2014-3642 was reported by Jan Rusnacko of Red Hat.