First published: Tue Jun 08 2021(Updated: )
An attacker with elevated privileges can utilize Ansible functions to carry out actions as the Foreman-proxy user on the system. The prerequisite for this is that the hosts must have already been added to Foreman, and the attacker must have access to one of these hosts. If the attacker already has access to the system, they are deemed trustworthy with a high level of privilege.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Theforeman Foreman Ansible | <7.1.0 | |
Redhat Satellite | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3589 is an authorization flaw found in Foreman Ansible, which allows an authenticated attacker with certain permissions to access hosts through job templates.
The severity of CVE-2021-3589 is high, with a severity value of 8.
The highest threat from CVE-2021-3589 is to data confidentiality and integrity, as well as system availability.
Foreman Ansible version up to 7.1.0 and Redhat Satellite version 6.0 are affected by CVE-2021-3589.
There is no known fix for CVE-2021-3589 at the moment. It is recommended to follow the provided references for any updates or patches.