An arbitrary code execution flaw was found in Foreman. This flaw allows an admin user to bypass safe mode in templates and execute arbitrary code on the underlying operating system.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2023:4466 | Release Notes Third Party Advisory |
https://access.redhat.com/errata/RHSA-2023:5979 | |
https://access.redhat.com/errata/RHSA-2023:5980 | |
https://access.redhat.com/errata/RHSA-2023:6818 | |
https://access.redhat.com/security/cve/CVE-2023-0118 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2159291 | Issue Tracking Third Party Advisory |
Configurations
History
03 May 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Sep 2023, 23:10
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
First Time |
Theforeman foreman
Redhat satellite Theforeman Redhat Redhat enterprise Linux |
|
CWE | CWE-78 | |
References | (MISC) https://access.redhat.com/errata/RHSA-2023:4466 - Release Notes, Third Party Advisory | |
References | (MISC) https://access.redhat.com/security/cve/CVE-2023-0118 - Third Party Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2159291 - Issue Tracking, Third Party Advisory | |
CPE | cpe:2.3:a:redhat:satellite:*:*:*:*:*:*:*:* cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* |
20 Sep 2023, 14:25
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-20 14:15
Updated : 2024-05-03 16:15
NVD link : CVE-2023-0118
Mitre link : CVE-2023-0118
CVE.ORG link : CVE-2023-0118
JSON object : View
Products Affected
redhat
- enterprise_linux
- satellite
theforeman
- foreman
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')