Red Hat CloudForms prior to 5.11.7.0 was vulnerable to the User Impersonation authorization flaw which allows malicious malicious user to create existent and non-existent role-based access control user, with groups and roles. With a selected group of EvmGroup-super_administrator, an attacker can perform any API request as a super administrator.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
redhat cloudforms |