First published: Tue Jul 12 2016(Updated: )
It was reported that non-admin users with the view_hosts permission containing a filter are able to access API routes beneath "hosts" such as GET /api/v2/hosts/secrethost/interfaces without the filter being taken into account. This allows users to access network interface details (including BMC login details) for any host. Affects Foreman 1.10.0 and higher. Upstream bug: <a href="http://projects.theforeman.org/issues/15653">http://projects.theforeman.org/issues/15653</a>
Affected Software | Affected Version | How to fix |
---|---|---|
The Foreman | >=1.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1355728 is considered high due to unauthorized access to sensitive network interface details.
To fix REDHAT-BUG-1355728, ensure that permissions and filters for non-admin users are properly configured in the Foreman settings.
Users of Foreman versions 1.10.0 and upwards who have non-admin access with the view_hosts permission are affected by REDHAT-BUG-1355728.
The implications of REDHAT-BUG-1355728 include potential exposure of network interface details to non-admin users.
An upgrade to a patched version of Foreman is recommended to fully address the vulnerabilities associated with REDHAT-BUG-1355728.