CVE-2013-4182 – foreman: app/controllers/api/v1/hosts_controller.rb API privilege escalation
https://notcve.org/view.php?id=CVE-2013-4182
app/controllers/api/v1/hosts_controller.rb in Foreman before 1.2.2 does not properly restrict access to hosts, which allows remote attackers to access arbitrary hosts via an API request. app/controllers/api/v1/hosts_controller.rb en Foreman anteriores a v1.2.2 no restringe correctamente el acceso a hosts arbitrarios a través de una petición API. • http://projects.theforeman.org/issues/2863 http://rhn.redhat.com/errata/RHSA-2013-1196.html http://theforeman.org/manuals/1.2/index.html#Releasenotesfor1.2.2 https://bugzilla.redhat.com/show_bug.cgi?id=990374 https://access.redhat.com/security/cve/CVE-2013-4182 • CWE-264: Permissions, Privileges, and Access Controls CWE-862: Missing Authorization •
CVE-2013-2113 – Foreman (RedHat OpenStack/Satellite) - users/create Mass Assignment
https://notcve.org/view.php?id=CVE-2013-2113
The create method in app/controllers/users_controller.rb in Foreman before 1.2.0-RC2 allows remote authenticated users with permissions to create or edit other users to gain privileges by (1) changing the admin flag or (2) assigning an arbitrary role. El método "create" en app/controllers/users_controller.rb en Foreman anterior a 1.2.0-RC2, permite a usuarios autenticados remotamente con permisos para crear o editar otros usuarios elevar sus privilegios mediante (1) modificando el flag de admin o (2) asignando un rol arbitrario. • https://www.exploit-db.com/exploits/27776 http://projects.theforeman.org/issues/2630 http://rhn.redhat.com/errata/RHSA-2013-0995.html https://bugzilla.redhat.com/show_bug.cgi?id=968166 https://groups.google.com/forum/#%21topic/foreman-users/6WpO_3ugiXU https://access.redhat.com/security/cve/CVE-2013-2113 https://bugzilla.redhat.com/show_bug.cgi?id=966804 https://projects.theforeman.org/issues/2630 • CWE-264: Permissions, Privileges, and Access Controls CWE-285: Improper Authorization CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes •
CVE-2013-2121 – Foreman (RedHat OpenStack/Satellite) - bookmarks/create Code Injection
https://notcve.org/view.php?id=CVE-2013-2121
Eval injection vulnerability in the create method in the Bookmarks controller in Foreman before 1.2.0-RC2 allows remote authenticated users with permissions to create bookmarks to execute arbitrary code via a controller name attribute. Vulnerabilidad de inyección Eval en el método "create" en el controlador Bookmarks en Foreman anterior a 1.2.0-RC2, permite a usuarios autenticados remotamente con permisos para crear favoritos, la ejecución arbitraria de código a través de un atributo de nombre de controlador. • https://www.exploit-db.com/exploits/27045 http://projects.theforeman.org/issues/2631 http://rhn.redhat.com/errata/RHSA-2013-0995.html http://www.exploit-db.com/exploits/27045 https://bugzilla.redhat.com/show_bug.cgi?id=966804 https://groups.google.com/forum/#%21topic/foreman-users/6WpO_3ugiXU https://access.redhat.com/security/cve/CVE-2013-2121 https://bugzilla.redhat.com/show_bug.cgi?id=968166 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') •
CVE-2012-3503 – Katello: Application.config.secret_token is not generated properly
https://notcve.org/view.php?id=CVE-2012-3503
The installation script in Katello 1.0 and earlier does not properly generate the Application.config.secret_token value, which causes each default installation to have the same secret token, and allows remote attackers to authenticate to the CloudForms System Engine web interface as an arbitrary user by creating a cookie using the default secret_token. El script de instalación en Katello 1.0 y anteriores no genera correctamente el valor Application.config.secret_token, lo que hace que cada instalación por defecto tenga el mismo testigo secreto, y permite a atacantes remotos autenticarse en el sistema de interfaz web CloudForms Engine como un usuario arbitrario creando una cookie mediante el secret_token por defecto. • http://rhn.redhat.com/errata/RHSA-2012-1186.html http://rhn.redhat.com/errata/RHSA-2012-1187.html http://secunia.com/advisories/50344 http://www.securityfocus.com/bid/55140 https://github.com/Katello/katello/commit/7c256fef9d75029d0ffff58ff1dcda915056d3a3 https://github.com/Katello/katello/pull/499 https://access.redhat.com/security/cve/CVE-2012-3503 https://bugzilla.redhat.com/show_bug.cgi?id=849210 • CWE-798: Use of Hard-coded Credentials •