CVE-2020-14369

This release fixes a Cross Site Request Forgery vulnerability was found in Red Hat CloudForms which forces end users to execute unwanted actions on a web application in which the user is currently authenticated. An attacker can make a forgery HTTP request to the server by crafting custom flash file which can force the user to perform state changing requests like provisioning VMs, running ansible playbooks and so forth.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1871921 Issue Tracking Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1871921 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:cloudforms:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:03

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=1871921 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1871921 - Issue Tracking, Vendor Advisory

Information

Published : 2020-12-02 15:15

Updated : 2024-11-21 05:03


NVD link : CVE-2020-14369

Mitre link : CVE-2020-14369

CVE.ORG link : CVE-2020-14369


JSON object : View

Products Affected

redhat

  • cloudforms
CWE
CWE-352

Cross-Site Request Forgery (CSRF)