First published: Fri Sep 14 2018(Updated: )
A vulnerability was discovered in the Foreman Remote Execution feature, allowing an unauthorized remote attacker to perform arbitrary code execution on managed hosts. The issue affects the component smart_proxy_dynflow 0.1.8 and later (Foreman >= 1.15, Satellite >= 6.3) Introducing commit: <a href="https://github.com/theforeman/smart_proxy_dynflow/commit/cb7b0b5c9b602f737ab4c6e9fb47c158241cf49c#diff-6dee70f4339cfc3dd8cedfc2a34f14c2">https://github.com/theforeman/smart_proxy_dynflow/commit/cb7b0b5c9b602f737ab4c6e9fb47c158241cf49c#diff-6dee70f4339cfc3dd8cedfc2a34f14c2</a> References: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - CVE-2018-14643 rubygem-smart_proxy_dynflow: Authentication bypass in Foreman remote execution feature [rhn_satellite_6.3]" href="show_bug.cgi?id=1629003">https://bugzilla.redhat.com/show_bug.cgi?id=1629003</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Theforeman Foreman |
Disable Smart Proxy Dynflow by setting the :enabled: option to false in the /etc/foreman-proxy/settings.d/dynflow.yml file.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14643 is an authentication bypass flaw in the smart_proxy_dynflow component used by Foreman, which allows remote execution of arbitrary commands on vulnerable Foreman instances.
The severity of CVE-2018-14643 is critical with a CVSS score of 9.8.
CVE-2018-14643 affects smart_proxy_dynflow versions up to exclusive 0.1.11 and 0.2.0 exactly, as well as Theforeman Foreman.
To fix CVE-2018-14643, upgrade smart_proxy_dynflow to version 0.1.11 or 0.2.1, or apply the relevant patch provided by the vendor.
You can find more information about CVE-2018-14643 in the NVD, GitHub, and Red Hat Security Advisories.