First published: Mon May 30 2016(Updated: )
It was found that attacker having the access to appliance filesystem is able to execute arbitrary code under the same privileges as appliance runs. This issue is present since upstream commit f077196c99feb874e5cba8b93c1f8dfe26421c1b. Upstream patch: <a href="https://github.com/ManageIQ/manageiq/pull/7856">https://github.com/ManageIQ/manageiq/pull/7856</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat CloudForms | <=4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4471 is considered a high severity vulnerability that allows arbitrary code execution by an attacker with access to the appliance filesystem.
To fix CVE-2016-4471, it is recommended to apply the relevant upstream patch from ManageIQ or upgrade to a patched version of Red Hat CloudForms.
CVE-2016-4471 affects all versions of Red Hat CloudForms up to and including version 4.0 that are using the vulnerable underlying system.
The potential impacts of CVE-2016-4471 include unauthorized code execution, which can lead to data loss, service disruption, or further compromise of the appliance.
Currently, there are no known workarounds for CVE-2016-4471; applying the patch is the only way to mitigate the vulnerability.