First published: Fri Mar 26 2021(Updated: )
Foreman versions before 2.3.4 and before 2.4.0 is affected by an improper authorization handling flaw. An authenticated attacker can impersonate the foreman-proxy if product enable the Puppet Certificate authority (CA) to sign certificate requests that have subject alternative names (SANs). Foreman do not enable SANs by default and `allow-authorization-extensions` is set to `false` unless user change `/etc/puppetlabs/puppetserver/conf.d/ca.conf` configuration explicitly.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Theforeman Foreman | <2.3.4 | |
redhat/foreman | <2.3.4 | 2.3.4 |
redhat/foreman | <2.4.0 | 2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3469 is a vulnerability in Foreman versions before 2.3.4 and before 2.4.0 that allows an authenticated attacker to impersonate the foreman-proxy if the product enables the Puppet Certificate authority (CA) to sign certificate requests with subject alternative names (SANs).
CVE-2021-3469 can be exploited by an authenticated attacker to impersonate the foreman-proxy and perform unauthorized actions.
CVE-2021-3469 has a severity rating of medium (5.4) based on the Common Vulnerability Scoring System (CVSS) v3.0.
Foreman versions before 2.3.4 and before 2.4.0 are affected by CVE-2021-3469.
To mitigate CVE-2021-3469, users are advised to upgrade their Foreman software to version 2.3.4 or higher.