Smart Proxy (aka Smart-Proxy and foreman-proxy) in Foreman before 1.5.4 and 1.6.x before 1.6.2 does not validate SSL certificates, which allows remote attackers to bypass intended authentication and execute arbitrary API requests via a request without a certificate.
References
Link | Resource |
---|---|
http://projects.theforeman.org/issues/7822 | Vendor Advisory |
http://rhn.redhat.com/errata/RHSA-2015-0287.html | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2015-0288.html | Third Party Advisory |
https://github.com/theforeman/smart-proxy/pull/217 | Issue Tracking Patch |
https://groups.google.com/forum/#%21topic/foreman-announce/jXC5ixybjqo | |
http://projects.theforeman.org/issues/7822 | Vendor Advisory |
http://rhn.redhat.com/errata/RHSA-2015-0287.html | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2015-0288.html | Third Party Advisory |
https://github.com/theforeman/smart-proxy/pull/217 | Issue Tracking Patch |
https://groups.google.com/forum/#%21topic/foreman-announce/jXC5ixybjqo |
Configurations
History
21 Nov 2024, 02:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://projects.theforeman.org/issues/7822 - Vendor Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-0287.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-0288.html - Third Party Advisory | |
References | () https://github.com/theforeman/smart-proxy/pull/217 - Issue Tracking, Patch | |
References | () https://groups.google.com/forum/#%21topic/foreman-announce/jXC5ixybjqo - |
Information
Published : 2015-03-09 14:59
Updated : 2024-11-21 02:08
NVD link : CVE-2014-3691
Mitre link : CVE-2014-3691
CVE.ORG link : CVE-2014-3691
JSON object : View
Products Affected
redhat
- openstack
theforeman
- foreman
CWE
CWE-310
Cryptographic Issues