First published: Fri Apr 09 2021(Updated: )
A smart proxy that provides a restful API to various sub-systems of the Foreman is affected by the flaw which can cause a Man-in-the-Middle attack. The FreeIPA module of Foreman smart proxy does not check the SSL certificate, thus, an unauthenticated attacker can perform actions in FreeIPA if certain conditions are met. The highest threat from this flaw is to system confidentiality. This flaw affects Foreman versions before 2.5.0.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/foreman | <2.5.0 | 2.5.0 |
Theforeman Foreman | <2.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-3494.
The severity of CVE-2021-3494 is medium with a severity value of 5.9.
The affected software version is Foreman up to version 2.5.0.
CVE-2021-3494 affects the smart proxy by allowing a Man-in-the-Middle attack through the FreeIPA module.
No, authentication is not required to exploit CVE-2021-3494.