Actions
Bug #25001
closedCVE-2018-14643 rubygem-smart_proxy_dynflow: Authentication bypass in Foreman remote execution feature
Difficulty:
Triaged:
No
Bugzilla link:
Fixed in Releases:
Found in Releases:
Description
We have discovered a critical vulnerability in the Foreman Remote Execution feature, allowing an unauthorized remote attacker to perform arbitrary code execution on managed hosts.
The affected component is Smart Proxy Dynflow, that exposes critical end-points without proper authorization.
The affected version of smart_proxy_dynflow package are 0.1.8 and later (Foreman >= 1.15)
This issue has been introduced as a regression with [1], where adding alternative authorization mechanism for async callback from remote hosts caused the original authorization to by bypassed.
Actions