Filtered by vendor Theforeman
Subscribe
Total
90 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2014-0007 | 1 Theforeman | 1 Foreman | 2024-11-21 | 7.5 HIGH | N/A |
The Smart-Proxy in Foreman before 1.4.5 and 1.5.x before 1.5.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the path parameter to tftp/fetch_boot_file. | |||||
CVE-2013-4386 | 2 Redhat, Theforeman | 2 Openstack, Foreman | 2024-11-21 | 7.5 HIGH | N/A |
Multiple SQL injection vulnerabilities in app/models/concerns/host_common.rb in Foreman before 1.2.3 allow remote attackers to execute arbitrary SQL commands via the (1) fqdn or (2) hostgroup parameter. | |||||
CVE-2013-4182 | 2 Redhat, Theforeman | 2 Openstack, Foreman | 2024-11-21 | 7.5 HIGH | N/A |
app/controllers/api/v1/hosts_controller.rb in Foreman before 1.2.2 does not properly restrict access to hosts, which allows remote attackers to access arbitrary hosts via an API request. | |||||
CVE-2013-4180 | 2 Redhat, Theforeman | 2 Openstack, Foreman | 2024-11-21 | 5.0 MEDIUM | N/A |
The (1) power and (2) ipmi_boot actions in the HostController in Foreman before 1.2.2 allow remote attackers to cause a denial of service (memory consumption) via unspecified input that is converted to a symbol. | |||||
CVE-2013-4120 | 1 Theforeman | 1 Katello | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Katello has a Denial of Service vulnerability in API OAuth authentication | |||||
CVE-2013-2143 | 2 Redhat, Theforeman | 2 Network Satellite, Katello | 2024-11-21 | 6.5 MEDIUM | N/A |
The users controller in Katello 1.5.0-14 and earlier, and Red Hat Satellite, does not check authorization for the update_roles action, which allows remote authenticated users to gain privileges by setting a user account to an administrator account. | |||||
CVE-2013-2121 | 2 Redhat, Theforeman | 2 Openstack, Foreman | 2024-11-21 | 6.0 MEDIUM | N/A |
Eval injection vulnerability in the create method in the Bookmarks controller in Foreman before 1.2.0-RC2 allows remote authenticated users with permissions to create bookmarks to execute arbitrary code via a controller name attribute. | |||||
CVE-2013-2113 | 2 Redhat, Theforeman | 2 Openstack, Foreman | 2024-11-21 | 6.0 MEDIUM | N/A |
The create method in app/controllers/users_controller.rb in Foreman before 1.2.0-RC2 allows remote authenticated users with permissions to create or edit other users to gain privileges by (1) changing the admin flag or (2) assigning an arbitrary role. | |||||
CVE-2013-2101 | 2 Redhat, Theforeman | 2 Satellite, Katello | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
Katello has multiple XSS issues in various entities | |||||
CVE-2013-0283 | 1 Theforeman | 1 Katello | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
Katello: Username in Notification page has cross site scripting | |||||
CVE-2013-0210 | 1 Theforeman | 1 Foreman | 2024-11-21 | 7.5 HIGH | N/A |
The smart proxy Puppet run API in Foreman before 1.2.0 allows remote attackers to execute arbitrary commands via vectors related to escaping and Puppet commands. | |||||
CVE-2013-0187 | 1 Theforeman | 1 Foreman | 2024-11-21 | 6.5 MEDIUM | N/A |
Foreman before 1.1 allows remote authenticated users to gain privileges via a (1) XMLHttpRequest or (2) AJAX request. | |||||
CVE-2013-0174 | 1 Theforeman | 1 Foreman | 2024-11-21 | 5.0 MEDIUM | N/A |
The external node classifier (ENC) API in Foreman before 1.1 allows remote attackers to obtain the hashed root password via an API request. | |||||
CVE-2013-0173 | 1 Theforeman | 1 Foreman | 2024-11-21 | 5.0 MEDIUM | N/A |
Foreman before 1.1 uses a salt of "foreman" to hash root passwords, which makes it easier for attackers to guess the password via a brute force attack. | |||||
CVE-2013-0171 | 1 Theforeman | 1 Foreman | 2024-11-21 | 7.5 HIGH | N/A |
Foreman before 1.1 allows remote attackers to execute arbitrary code via a crafted YAML object to the (1) fact or (2) report import API. | |||||
CVE-2012-5648 | 1 Theforeman | 1 Foreman | 2024-11-21 | 7.5 HIGH | N/A |
Multiple SQL injection vulnerabilities in Foreman before 1.0.2 allow remote attackers to execute arbitrary SQL commands via unspecified parameters to (1) app/models/hostext/search.rb or (2) app/models/puppetclass.rb, related to the search mechanism. | |||||
CVE-2012-5477 | 1 Theforeman | 1 Foreman | 2024-11-21 | 3.6 LOW | N/A |
The smart proxy in Foreman before 1.1 uses a umask set to 0, which allows local users to modify files created by the daemon via unspecified vectors. | |||||
CVE-2012-3503 | 2 Redhat, Theforeman | 2 Enterprise Linux Server, Katello | 2024-11-21 | 6.5 MEDIUM | 9.8 CRITICAL |
The installation script in Katello 1.0 and earlier does not properly generate the Application.config.secret_token value, which causes each default installation to have the same secret token, and allows remote attackers to authenticate to the CloudForms System Engine web interface as an arbitrary user by creating a cookie using the default secret_token. | |||||
CVE-2024-7700 | 2 Redhat, Theforeman | 2 Satellite, Foreman | 2024-09-16 | N/A | 6.5 MEDIUM |
A command injection flaw was found in the "Host Init Config" template in the Foreman application via the "Install Packages" field on the "Register Host" page. This flaw allows an attacker with the necessary privileges to inject arbitrary commands into the configuration, potentially allowing unauthorized command execution during host registration. Although this issue requires user interaction to execute injected commands, it poses a significant risk if an unsuspecting user runs the generated registration script. | |||||
CVE-2023-0118 | 2 Redhat, Theforeman | 3 Enterprise Linux, Satellite, Foreman | 2024-05-03 | N/A | 9.1 CRITICAL |
An arbitrary code execution flaw was found in Foreman. This flaw allows an admin user to bypass safe mode in templates and execute arbitrary code on the underlying operating system. |