First published: Mon Mar 27 2017(Updated: )
Tomas Strachota of Red Hat reports: It was found that Hammer CLI, a CLI utility for Foreman, did not explicitly set the verify_ssl flag for apipie-bindings that disable it by default. As a result the server certificates are not checked and connections are prone to man-in-the-middle attacks. Upstream issue: <a href="http://projects.theforeman.org/issues/19033">http://projects.theforeman.org/issues/19033</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Hammer CLI | ||
The Foreman |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1436262 is considered high due to the potential for man-in-the-middle attacks.
To fix REDHAT-BUG-1436262, explicitly set the verify_ssl flag to enable SSL certificate verification in Hammer CLI.
REDHAT-BUG-1436262 affects Red Hat Hammer CLI and TheForeman Foreman.
REDHAT-BUG-1436262 exposes systems to man-in-the-middle attacks due to the lack of SSL certificate verification.
A potential workaround for REDHAT-BUG-1436262 is to manually specify SSL verification settings in your CLI commands.