First published: Fri Mar 19 2021(Updated: )
An improper authorization handling flaw was found in Foreman. The Salt plugin for the smart-proxy allows foreman clients to execute actions that should be limited to the Foreman Server. This flaw allows an authenticated local attacker to access and delete limited resources and also causes a denial of service on the Foreman server. The highest threat from this vulnerability is to integrity and system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Theforeman Smart Proxy Salt | <=2.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw in Foreman is CVE-2021-3456.
The severity of CVE-2021-3456 is high.
The affected software for CVE-2021-3456 is Theforeman Smart Proxy Salt version up to and including 2.1.5.
The CWE ID for CVE-2021-3456 is 863.
An authenticated local attacker can exploit CVE-2021-3456 to access and delete limited resources and cause a denial of service.