First published: Mon Jan 09 2023(Updated: )
An admin user on Foreman can bypass safe mode in templates and execute arbitrary code via the Report Templates function. When changing the "template" JSON value in the POST request, an attacker can exploit the bind() call in safemode to inject an OS command in the underlying operating system.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Theforeman Foreman | ||
Redhat Satellite | >=6.13<6.13.3 | |
Redhat Enterprise Linux | =8.0 | |
redhat/foreman | <6.13.3 | 6.13.3 |
All of | ||
Redhat Satellite | >=6.13<6.13.3 | |
Redhat Enterprise Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0118 is an arbitrary code execution flaw found in Foreman that allows an admin user to bypass safe mode in templates and execute arbitrary code on the underlying operating system.
CVE-2023-0118 has a severity rating of 9.1, which is considered critical.
Foreman, Redhat Satellite (version 6.13.3 and earlier) are affected by CVE-2023-0118.
An admin user can exploit CVE-2023-0118 by bypassing safe mode in templates and executing arbitrary code on the underlying operating system.
No, Redhat Enterprise Linux 8.0 systems are not vulnerable to CVE-2023-0118.