Redhat

Cloudforms Management Engine

42 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.14%
  • Published 06.07.2022 20:15:07
  • Last modified 21.11.2024 02:18:41

A insecure configuration for certificate verification (http.verify_mode = OpenSSL::SSL::VERIFY_NONE) may lead to verification bypass in Red Hat CloudForms 5.x.

  • EPSS 1.13%
  • Published 11.08.2020 14:15:11
  • Last modified 21.11.2024 05:03:00

A high severity vulnerability was found in all active versions of Red Hat CloudForms before 5.11.7.0. The out of band OS command injection vulnerability can be exploited by authenticated attacker while setuping conversion host through Infrastructure ...

  • EPSS 0.15%
  • Published 11.08.2020 14:15:11
  • Last modified 21.11.2024 05:02:56

Red Hat CloudForms 4.7 and 5 was vulnerable to Server-Side Request Forgery (SSRF) flaw. With the access to add Ansible Tower provider, an attacker could scan and attack systems from the internal network which are not normally accessible.

  • EPSS 0.4%
  • Published 11.08.2020 14:15:11
  • Last modified 21.11.2024 04:56:03

Red Hat CloudForms 4.7 and 5 is affected by CSV Injection flaw, a crafted payload stays dormant till a victim export as CSV and opens the file with Excel. Once the victim opens the file, the formula executes, triggering any number of possible events....

  • EPSS 0.65%
  • Published 22.06.2020 18:15:10
  • Last modified 21.11.2024 04:27:37

A flaw was found in the CloudForms management engine version 5.10 and CloudForms management version 5.11, which triggered remote code execution through NFS schedule backup. An attacker logged into the management console could use this flaw to execute...

  • EPSS 0.05%
  • Published 31.03.2020 17:15:26
  • Last modified 21.11.2024 04:27:39

A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code c...

  • EPSS 0.04%
  • Published 16.03.2020 16:15:14
  • Last modified 21.11.2024 05:11:17

A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp a...

  • EPSS 0.14%
  • Published 16.03.2020 16:15:14
  • Last modified 21.11.2024 05:11:16

A flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file...

Exploit
  • EPSS 0.14%
  • Published 16.03.2020 16:15:13
  • Last modified 21.11.2024 05:11:16

A flaw was found in the Ansible Engine when the fetch module is used. An attacker could intercept the module, inject a new path, and then choose a new destination path on the controller node. All versions in 2.7.x, 2.8.x and 2.9.x branches are believ...

Exploit
  • EPSS 0.04%
  • Published 16.03.2020 16:15:13
  • Last modified 21.11.2024 05:11:16

A flaw was found in Ansible Engine when a file is moved using atomic_move primitive as the file mode cannot be specified. This sets the destination files world-readable if the destination file does not exist and if the file exists, the file could be ...