First published: Mon Mar 09 2015(Updated: )
Smart Proxy (aka Smart-Proxy and foreman-proxy) in Foreman before 1.5.4 and 1.6.x before 1.6.2 does not validate SSL certificates, which allows remote attackers to bypass intended authentication and execute arbitrary API requests via a request without a certificate.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenStack for IBM Power | =4.0 | |
Red Hat OpenStack for IBM Power | =5.0 | |
The Foreman | <=1.5.3 | |
The Foreman | =1.6.0 | |
The Foreman | =1.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3691 is classified as a critical vulnerability due to its ability to allow remote attackers to bypass authentication.
To fix CVE-2014-3691, upgrade Foreman to version 1.5.4 or 1.6.2 or later to ensure proper SSL certificate validation.
CVE-2014-3691 affects Foreman versions prior to 1.5.4 and 1.6.x versions before 1.6.2, as well as specific versions of Red Hat OpenStack.
Due to CVE-2014-3691, attackers can potentially execute arbitrary API requests without proper authentication.
Yes, CVE-2014-3691 can be exploited over the internet if the affected systems are accessible from external networks.