First published: Tue Mar 16 2021(Updated: )
An improper authorization handling flaw was found in Foreman. The OpenSCAP plugin for the smart-proxy allows foreman clients to execute actions that should be limited to the Foreman Server. This flaw allows an authenticated local attacker to access and delete limited resources and also causes a denial of service on the Foreman server. The highest threat from this vulnerability is to integrity and system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Theforeman Openscap | <0.9.1 | |
redhat/smart_proxy_openscap | <0.9.1 | 0.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20290 is an improper authorization handling flaw in Foreman that allows authenticated local attackers to access and delete limited resources.
CVE-2021-20290 allows foreman clients to execute actions that should be limited to the Foreman Server.
CVE-2021-20290 has a severity level of 6.1 (medium).
To fix CVE-2021-20290, update to version 0.9.1 or later of the smart_proxy_openscap package.
You can find more information about CVE-2021-20290 in the references provided: [Link 1](https://github.com/theforeman/smart_proxy_openscap/pull/80) and [Link 2](https://bugzilla.redhat.com/show_bug.cgi?id=1939701).