Total
68 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2015-5233 | 2 Redhat, Theforeman | 2 Satellite, Foreman | 2023-02-13 | 6.0 MEDIUM | 4.2 MEDIUM |
Foreman before 1.8.4 and 1.9.x before 1.9.1 do not properly apply view_hosts permissions, which allows (1) remote authenticated users with the view_reports permission to read reports from arbitrary hosts or (2) remote authenticated users with the destroy_reports permission to delete reports from arbitrary hosts via direct access to the (a) individual report show/delete pages or (b) APIs. | |||||
CVE-2015-5152 | 1 Theforeman | 1 Foreman | 2023-02-13 | 4.3 MEDIUM | 8.1 HIGH |
Foreman after 1.1 and before 1.9.0-RC1 does not redirect HTTP requests to HTTPS when the require_ssl setting is set to true, which allows remote attackers to obtain user credentials via a man-in-the-middle attack. | |||||
CVE-2015-3235 | 1 Theforeman | 1 Foreman | 2023-02-13 | 6.0 MEDIUM | N/A |
Foreman before 1.9.0 allows remote authenticated users with the edit_users permission to edit administrator users and change their passwords via unspecified vectors. | |||||
CVE-2015-3155 | 1 Theforeman | 1 Foreman | 2023-02-13 | 5.0 MEDIUM | N/A |
Foreman before 1.8.1 does not set the secure flag for the _session_id cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. | |||||
CVE-2014-3691 | 2 Redhat, Theforeman | 2 Openstack, Foreman | 2023-02-13 | 7.5 HIGH | N/A |
Smart Proxy (aka Smart-Proxy and foreman-proxy) in Foreman before 1.5.4 and 1.6.x before 1.6.2 does not validate SSL certificates, which allows remote attackers to bypass intended authentication and execute arbitrary API requests via a request without a certificate. | |||||
CVE-2014-3531 | 1 Theforeman | 1 Foreman | 2023-02-13 | 3.5 LOW | 5.4 MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in Foreman before 1.5.2 allow remote authenticated users to inject arbitrary web script or HTML via the operating system (1) name or (2) description. | |||||
CVE-2014-0208 | 1 Theforeman | 1 Foreman | 2023-02-13 | 3.5 LOW | 5.4 MEDIUM |
Cross-site scripting (XSS) vulnerability in the search auto-completion functionality in Foreman before 1.4.4 allows remote authenticated users to inject arbitrary web script or HTML via a crafted key name. | |||||
CVE-2014-0192 | 1 Theforeman | 1 Foreman | 2023-02-13 | 5.0 MEDIUM | N/A |
Foreman 1.4.0 before 1.5.0 does not properly restrict access to provisioning template previews, which allows remote attackers to obtain sensitive information via the hostname parameter, related to "spoof." | |||||
CVE-2014-0091 | 1 Theforeman | 1 Foreman | 2023-02-13 | 5.0 MEDIUM | 5.3 MEDIUM |
Foreman has improper input validation which could lead to partial Denial of Service | |||||
CVE-2014-0090 | 1 Theforeman | 1 Foreman | 2023-02-13 | 6.8 MEDIUM | N/A |
Session fixation vulnerability in Foreman before 1.4.2 allows remote attackers to hijack web sessions via the session id cookie. | |||||
CVE-2014-0089 | 1 Theforeman | 1 Foreman | 2023-02-13 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in app/views/common/500.html.erb in Foreman 1.4.x before 1.4.2 allows remote authenticated users to inject arbitrary web script or HTML via the bookmark name when adding a bookmark. | |||||
CVE-2014-0007 | 1 Theforeman | 1 Foreman | 2023-02-13 | 7.5 HIGH | N/A |
The Smart-Proxy in Foreman before 1.4.5 and 1.5.x before 1.5.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the path parameter to tftp/fetch_boot_file. | |||||
CVE-2013-4386 | 2 Redhat, Theforeman | 2 Openstack, Foreman | 2023-02-13 | 7.5 HIGH | N/A |
Multiple SQL injection vulnerabilities in app/models/concerns/host_common.rb in Foreman before 1.2.3 allow remote attackers to execute arbitrary SQL commands via the (1) fqdn or (2) hostgroup parameter. | |||||
CVE-2018-14643 | 1 Theforeman | 1 Foreman | 2023-02-12 | 10.0 HIGH | 9.8 CRITICAL |
An authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulnerable Foreman instances, in a highly privileged context. | |||||
CVE-2016-8634 | 1 Theforeman | 1 Foreman | 2023-02-12 | 3.5 LOW | 5.4 MEDIUM |
A vulnerability was found in foreman 1.14.0. When creating an organization or location in Foreman, if the name contains HTML then the second step of the wizard (/organizations/id/step2) will render the HTML. This occurs in the alertbox on the page. The result is a stored XSS attack if an organization/location with HTML in the name is created, then a user is linked directly to this URL. | |||||
CVE-2016-8613 | 1 Theforeman | 1 Foreman | 2023-02-12 | 4.3 MEDIUM | 6.1 MEDIUM |
A flaw was found in foreman 1.5.1. The remote execution plugin runs commands on hosts over SSH from the Foreman web UI. When a job is submitted that contains HTML tags, the console output shown in the web UI does not escape the output causing any HTML or JavaScript to run in the user's browser. The output of the job is stored, making this a stored XSS vulnerability. | |||||
CVE-2016-4995 | 1 Theforeman | 1 Foreman | 2023-02-12 | 3.5 LOW | 5.3 MEDIUM |
Foreman before 1.11.4 and 1.12.x before 1.12.1 does not properly restrict access to preview provisioning templates, which allows remote authenticated users with permission to view some hosts to obtain sensitive host configuration information via a URL with a hostname. | |||||
CVE-2016-4475 | 1 Theforeman | 1 Foreman | 2023-02-12 | 6.5 MEDIUM | 8.8 HIGH |
The (1) Organization and (2) Locations APIs and UIs in Foreman before 1.11.4 and 1.12.x before 1.12.0-RC3 allow remote authenticated users to bypass organization and location restrictions and (a) read, (b) edit, or (c) delete arbitrary organizations or locations via unspecified vectors. | |||||
CVE-2016-4451 | 1 Theforeman | 1 Foreman | 2023-02-12 | 6.0 MEDIUM | 5.0 MEDIUM |
The (1) Organization and (2) Locations APIs in Foreman before 1.11.3 and 1.12.x before 1.12.0-RC1 allow remote authenticated users with unlimited filters to bypass organization and location restrictions and read or modify data for an arbitrary organization by leveraging knowledge of the id of that organization. | |||||
CVE-2016-3728 | 1 Theforeman | 1 Foreman | 2023-02-12 | 6.8 MEDIUM | 8.8 HIGH |
Eval injection vulnerability in tftp_api.rb in the TFTP module in the Smart-Proxy in Foreman before 1.10.4 and 1.11.x before 1.11.2 allows remote attackers to execute arbitrary code via the PXE template type portion of the PATH_INFO to tftp/. |