Actions
Bug #5436
closedCVE-2014-0192 - provisioning templates are world accessible
Description
since 1e0fd283 it is possible to override spoof by providing a hostname parameters.
this would allow to retrieve any template of any host bypassing authentication.
Updated by Ohad Levy over 10 years ago
a simple example using curl:
curl http://0.0.0.0:3000/unattended/provision\?hostname\=abc
Updated by Dominic Cleal over 10 years ago
Hm, I think I see from the code - we're only applying the authorisation filters when the spoof parameter isn't used, in the assumption that this is the only parameter needing protection. Bit messy.
This has probably been in since 5b70f0e0 / #359, so Foreman 1.4.0 and above are affected.
Updated by Dominic Cleal over 10 years ago
- Private changed from Yes to No
Removing private flag as it's been reported publicly.
Updated by Dominic Cleal over 10 years ago
- Has duplicate Bug #5463: No authentication required for /unattended/provision?hostname=HOSTNAME added
Updated by Ohad Levy over 10 years ago
- Status changed from New to Ready For Testing
- Assignee set to Ohad Levy
Updated by Ohad Levy over 10 years ago
- Status changed from Ready For Testing to Closed
- % Done changed from 0 to 100
Applied in changeset aa0ebe8eef311875695135c1714cb09225e8cd13.
Updated by Dominic Cleal over 10 years ago
- Subject changed from provisioning templates are world accessible to CVE-2014-0192 - provisioning templates are world accessible
Updated by Dominic Cleal over 10 years ago
- Translation missing: en.field_release changed from 4 to 17
Fix available in 1.5.0-RC2 and above.
Actions