First published: Wed Apr 30 2014(Updated: )
Jan Rusnacko of Red Hat reports: current CFME code contains dangerous send in cfme/vmdb/app/controllers/application_controller/performance.rb : 747: p_rpt.where_clause[2] = @perf_record.send(@perf_options[:parent].underscore).id This calls .send method on @perf_record, with argument @perf_options[:parent], which is supplied by user: 29: @perf_options[:parent] = params[:compare_to].blank? ? nil : params[:compare_to] if params.has_key?(:compare_to)
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Cloudforms 3.0.1 Management Engine | =5.2.1 | |
Redhat Cloudforms 3.0.2 Management Engine | =5.2.2 | |
Redhat Cloudforms 3.0.3 Management Engine | =5.2.3 | |
Redhat Cloudforms 3.0.4 Management Engine | =5.2.4 | |
Redhat Cloudforms 3.0.5 Management Engine | <=5.2.5 | |
Redhat Cloudforms 3.0 Management Engine | =5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.