Page 14 of 94 results (0.012 seconds)

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

Red Hat CloudForms Management Engine 4.1 does not properly handle regular expressions passed to the expression engine via the JSON API and the web-based UI, which allows remote authenticated users to execute arbitrary shell commands by leveraging the ability to view and filter collections. Red Hat CloudForms Management Engine 4.1 no maneja adecuadamente expresiones regulares pasadas al motor de expresión a través de la API JSON y la interfaz de usuario basada en web, lo que permite a usuarios remotos autenticados ejecutar comandos shell arbitrarios aprovechando la capacidad de ver y filtrar colecciones. An input validation flaw was found in the way CloudForms regular expressions were passed to the expression engine via both the JSON API and the web based UI. A user with the ability to view collections and filter them could use this flaw to execute arbitrary shell commands on the host with the privileges of the CloudForms process. • http://rhn.redhat.com/errata/RHSA-2016-1996.html http://www.securityfocus.com/bid/93893 https://access.redhat.com/security/cve/CVE-2016-7040 https://bugzilla.redhat.com/show_bug.cgi?id=1375089 • CWE-20: Improper Input Validation CWE-284: Improper Access Control •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

The web UI in Red Hat CloudForms 4.1 allows remote authenticated users to execute arbitrary code via vectors involving "Lack of field filters." La web UI en Red hat CloudForms 4.1 permite a usuarios remotos autenticados ejecutar un código arbitrario a través de vectores relacionados con "falta de filtros de campo". It was found that the CloudForms web UI did not properly filter input in certain fields. A remote, authenticated attacker could use this flaw to execute arbitrary code on the system running CloudForms. • http://rhn.redhat.com/errata/RHSA-2016-1634.html http://www.securityfocus.com/bid/92585 https://access.redhat.com/security/cve/CVE-2016-5383 https://bugzilla.redhat.com/show_bug.cgi?id=1353722 • CWE-20: Improper Input Validation CWE-284: Improper Access Control •

CVSS: 5.1EPSS: 0%CPEs: 4EXPL: 0

Red Hat CloudForms 3.2 Management Engine (CFME) 5.4.4 and CloudForms 4.0 Management Engine (CFME) 5.5.0 do not properly encrypt data in the backend PostgreSQL database, which might allow local users to obtain sensitive data and consequently gain privileges by leveraging access to (1) database exports or (2) log files. Red Hat CloudForms 3.2 Management Engine (CFME) 5.4.4 y CloudForms 4.0 Management Engine (CFME) 5.5.0 no cifra correctamente datos en el backend de base de datos PostgreSQL, lo que podría permitir a usuarios locales obtener datos sensibles y consecuentemente obtener privilegios aprovechándose del acceso a (1) exportaciones de base de datos o (2) archivos de registro. A privilege escalation flaw was discovered in CloudForms, where in certain situations, CloudForms could read encrypted data from the database and then write decrypted data back into the database. If the database was then exported or log files generated, a local attacker might be able to gain access to sensitive information. • http://rhn.redhat.com/errata/RHSA-2015-2620.html https://access.redhat.com/errata/RHSA-2015:2551 https://bugzilla.redhat.com/show_bug.cgi?id=1283019 https://access.redhat.com/security/cve/CVE-2015-7502 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-522: Insufficiently Protected Credentials •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 1

Nokogiri before 1.5.4 is vulnerable to XXE attacks Nokogiri versiones anteriores a 1.5.4, es vulnerable a ataques de tipo XXE. • https://bugzilla.redhat.com/show_bug.cgi?id=1178970 https://github.com/sparklemotion/nokogiri/issues/693 https://nokogiri.org/CHANGELOG.html#154-2012-06-12 https://access.redhat.com/security/cve/CVE-2012-6685 • CWE-611: Improper Restriction of XML External Entity Reference CWE-776: Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

SQL injection vulnerability in Red Hat CloudForms 3.1 Management Engine (CFME) 5.3 allows remote authenticated users to execute arbitrary SQL commands via a crafted REST API request to an SQL filter. Vulnerabilidad de inyección SQL en Red Hat CloudForms 3.1 Management Engine (CFME) 5.3 permite a usuarios remotos autenticados ejecutar comandos SQL arbitrarios a través de una solicitud API REST manipulada en un filtro SQL. It was found that CloudForms 4 exposed SQL filters via the REST API without any input escaping. An authenticated user could use this flaw to perform SQL injection attacks against the CloudForms Management Engine database. • http://rhn.redhat.com/errata/RHSA-2015-0028.html http://secunia.com/advisories/62255 https://access.redhat.com/security/cve/CVE-2014-7814 https://bugzilla.redhat.com/show_bug.cgi?id=1157881 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •