First published: Mon Jun 07 2021(Updated: )
A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injection. The highest threat from this vulnerability is to confidentiality, integrity and availability of system. Fixed releases are 2.4.1, 2.5.1, 3.0.0.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Theforeman Foreman | <2.4.1 | |
Theforeman Foreman | >=2.5.0<2.5.1 | |
Theforeman Foreman | =3.0.0-rc1 | |
Theforeman Foreman | =3.0.0-rc2 | |
Redhat Satellite | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-3584.
The severity of CVE-2021-3584 is critical (7.2).
Versions up to and excluding 2.4.1, 2.5.1, and 3.0.0 of the Foreman project are affected.
An authenticated attacker could exploit this vulnerability by using Sendmail configuration options to perform command injection.
You can find more information about CVE-2021-3584 in the following references: [here](https://projects.theforeman.org/issues/32753), [here](https://github.com/theforeman/foreman/pull/8599), and [here](https://access.redhat.com/errata/RHSA-2022:5498).