CVE-2023-0462

An arbitrary code execution flaw was found in Foreman. This issue may allow an admin user to execute arbitrary code on the underlying operating system by setting global parameters with a YAML payload.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2023-0462 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2162970 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:redhat:satellite:*:*:*:*:*:*:*:*

History

22 Sep 2023, 23:12

Type Values Removed Values Added
References (MISC) https://access.redhat.com/security/cve/CVE-2023-0462 - (MISC) https://access.redhat.com/security/cve/CVE-2023-0462 - Third Party Advisory
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2162970 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2162970 - Issue Tracking, Third Party Advisory
CPE cpe:2.3:a:redhat:satellite:*:*:*:*:*:*:*:*
cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:*
First Time Redhat satellite
Theforeman foreman
Redhat
Theforeman
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
CWE CWE-94

20 Sep 2023, 14:25

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-20 14:15

Updated : 2024-02-28 20:33


NVD link : CVE-2023-0462

Mitre link : CVE-2023-0462

CVE.ORG link : CVE-2023-0462


JSON object : View

Products Affected

theforeman

  • foreman

redhat

  • satellite
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')