// For flags

CVE-2014-3486

CFME: SSH Utility insecure tmp file creation leading to code execution as root

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The (1) shell_exec function in lib/util/MiqSshUtilV1.rb and (2) temp_cmd_file function in lib/util/MiqSshUtilV2.rb in Red Hat CloudForms 3.0 Management Engine (CFME) before 5.2.4.2 allow local users to execute arbitrary commands via a symlink attack on a temporary file with a predictable name.

(1) La función shell_exec en lib/util/MiqSshUtilV1.rb y (2) la función temp_cmd_file en lib/util/MiqSshUtilV2.rb en Red Hat CloudForms 3.0 Management Engine (CFME) anterior a 5.2.4.2 permiten a usuarios locales ejecutar comandos arbitrarios a través de un ataque de enlace simbólico sobre un fichero temporal con un nombre predecible.

Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. The SSH utility script created a world-writable file in /tmp/ using a predictable name, and then executed it as root. A local attacker could use this flaw to execute arbitrary commands as the root user. A directory traversal flaw was found in the way Ruby on Rails handled wildcard segments in routes with implicit rendering. A remote attacker could use this flaw to retrieve arbitrary local files accessible to a Ruby on Rails application using the aforementioned routes via a specially crafted request.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2014-05-14 CVE Reserved
  • 2014-06-30 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-59: Improper Link Resolution Before File Access ('Link Following')
  • CWE-377: Insecure Temporary File
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Redhat
Search vendor "Redhat"
Cloudforms 3.0 Management Engine
Search vendor "Redhat" for product "Cloudforms 3.0 Management Engine"
<= 5.2.4
Search vendor "Redhat" for product "Cloudforms 3.0 Management Engine" and version " <= 5.2.4"
-
Affected
Redhat
Search vendor "Redhat"
Cloudforms 3.0 Management Engine
Search vendor "Redhat" for product "Cloudforms 3.0 Management Engine"
5.2
Search vendor "Redhat" for product "Cloudforms 3.0 Management Engine" and version "5.2"
-
Affected
Redhat
Search vendor "Redhat"
Cloudforms 3.0 Management Engine
Search vendor "Redhat" for product "Cloudforms 3.0 Management Engine"
5.2.1
Search vendor "Redhat" for product "Cloudforms 3.0 Management Engine" and version "5.2.1"
-
Affected
Redhat
Search vendor "Redhat"
Cloudforms 3.0 Management Engine
Search vendor "Redhat" for product "Cloudforms 3.0 Management Engine"
5.2.1.6
Search vendor "Redhat" for product "Cloudforms 3.0 Management Engine" and version "5.2.1.6"
-
Affected
Redhat
Search vendor "Redhat"
Cloudforms 3.0 Management Engine
Search vendor "Redhat" for product "Cloudforms 3.0 Management Engine"
5.2.2
Search vendor "Redhat" for product "Cloudforms 3.0 Management Engine" and version "5.2.2"
-
Affected
Redhat
Search vendor "Redhat"
Cloudforms 3.0 Management Engine
Search vendor "Redhat" for product "Cloudforms 3.0 Management Engine"
5.2.3
Search vendor "Redhat" for product "Cloudforms 3.0 Management Engine" and version "5.2.3"
-
Affected
Redhat
Search vendor "Redhat"
Cloudforms 3.0 Management Engine
Search vendor "Redhat" for product "Cloudforms 3.0 Management Engine"
5.2.3.2
Search vendor "Redhat" for product "Cloudforms 3.0 Management Engine" and version "5.2.3.2"
-
Affected