The Smart-Proxy in Foreman before 1.4.5 and 1.5.x before 1.5.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the path parameter to tftp/fetch_boot_file.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2014-0007 from the MITRE CVE dictionary dictionary and NIST NVD.
Base Score | 10 |
---|---|
Base Metrics | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Access Vector | Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | Complete |
Integrity Impact | Complete |
Availability Impact | Complete |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux OpenStack Platform 3.0 (ruby193-foreman-proxy) | RHSA-2014:0770 | 2014-06-19 |
Red Hat Enterprise Linux OpenStack Platform 4.0 (foreman-proxy) | RHSA-2014:0770 | 2014-06-19 |
Platform | Package | State |
---|---|---|
Red Hat Satellite 6 | foreman-proxy | Affected |
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) | foreman-proxy | Affected |