Theforeman

Foreman

71 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.33%
  • Published 31.10.2024 15:15:17
  • Last modified 06.11.2024 09:15:04

A vulnerability was found in Foreman's loader macros introduced with report templates. These macros may allow an authenticated user with permissions to view and create templates to read any field from Foreman's database. By using specific strings in ...

  • EPSS 0.17%
  • Published 12.08.2024 17:15:18
  • Last modified 16.09.2024 14:20:21

A command injection flaw was found in the "Host Init Config" template in the Foreman application via the "Install Packages" field on the "Register Host" page. This flaw allows an attacker with the necessary privileges to inject arbitrary commands int...

  • EPSS 1.74%
  • Published 14.05.2024 16:17:37
  • Last modified 21.11.2024 09:43:45

A vulnerability was found in Satellite. When running a remote execution job on a host, the host's SSH key is not being checked. When the key changes, the Satellite still connects it because it uses "-o StrictHostKeyChecking=no". This flaw can lead to...

  • EPSS 0.07%
  • Published 03.10.2023 15:15:40
  • Last modified 21.11.2024 08:36:11

A sensitive information exposure vulnerability was found in foreman. Contents of tomcat's server.xml file, which contain passwords to candlepin's keystore and truststore, were found to be world readable.

  • EPSS 0.17%
  • Published 22.09.2023 14:15:44
  • Last modified 21.11.2024 07:20:24

A command injection flaw was found in foreman. This flaw allows an authenticated user with admin privileges on the foreman instance to transpile commands through CoreOS and Fedora CoreOS configurations in templates, possibly resulting in arbitrary co...

  • EPSS 0.08%
  • Published 20.09.2023 14:15:12
  • Last modified 21.11.2024 07:37:13

An arbitrary code execution flaw was found in Foreman. This issue may allow an admin user to execute arbitrary code on the underlying operating system by setting global parameters with a YAML payload.

  • EPSS 0.04%
  • Published 20.09.2023 14:15:12
  • Last modified 21.11.2024 07:36:35

An arbitrary code execution flaw was found in Foreman. This flaw allows an admin user to bypass safe mode in templates and execute arbitrary code on the underlying operating system.

  • EPSS 0.03%
  • Published 26.08.2022 16:15:08
  • Last modified 21.11.2024 05:46:13

A flaw was found in the Foreman project. The Datacenter plugin exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as ...

  • EPSS 0.16%
  • Published 22.08.2022 15:15:13
  • Last modified 21.11.2024 06:21:55

A flaw was found in Foreman project. A credential leak was identified which will expose Azure Compute Profile password through JSON of the API output. The highest threat from this vulnerability is to data confidentiality and integrity as well as syst...

  • EPSS 0.11%
  • Published 16.08.2022 21:15:09
  • Last modified 21.11.2024 04:55:54

A flaw was found where the Plaintext Candlepin password is disclosed while updating Red Hat Satellite through the satellite-installer. This flaw allows an attacker with sufficiently high privileges, such as root, to retrieve the Candlepin plaintext p...