CVE-2021-3584
foreman: Authenticate remote code execution through Sendmail configuration
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injection. The highest threat from this vulnerability is to confidentiality, integrity and availability of system. Fixed releases are 2.4.1, 2.5.1, 3.0.0.
Se encontró una vulnerabilidad de ejecución de código remota del lado del servidor Foreman project. Un atacante autenticado podría usar las opciones de configuración de Sendmail para sobrescribir los valores predeterminados y llevar a cabo una inyección de comandos. La mayor amenaza de esta vulnerabilidad es para la confidencialidad, integridad y disponibilidad del sistema. Las versiones corregidas son 2.4.1, 2.5.1 y 3.0.0
A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injection. The highest threat from this vulnerability is to confidentiality, integrity and availability of system.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-06-07 CVE Reserved
- 2021-12-23 CVE Published
- 2024-06-06 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (4)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/theforeman/foreman/pull/8599 | 2022-01-05 | |
https://projects.theforeman.org/issues/32753 | 2022-01-05 |
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1968439 | 2022-01-05 | |
https://access.redhat.com/security/cve/CVE-2021-3584 | 2022-07-05 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Theforeman Search vendor "Theforeman" | Foreman Search vendor "Theforeman" for product "Foreman" | < 2.4.1 Search vendor "Theforeman" for product "Foreman" and version " < 2.4.1" | - |
Affected
| ||||||
Theforeman Search vendor "Theforeman" | Foreman Search vendor "Theforeman" for product "Foreman" | >= 2.5.0 < 2.5.1 Search vendor "Theforeman" for product "Foreman" and version " >= 2.5.0 < 2.5.1" | - |
Affected
| ||||||
Theforeman Search vendor "Theforeman" | Foreman Search vendor "Theforeman" for product "Foreman" | 3.0.0 Search vendor "Theforeman" for product "Foreman" and version "3.0.0" | rc1 |
Affected
| ||||||
Theforeman Search vendor "Theforeman" | Foreman Search vendor "Theforeman" for product "Foreman" | 3.0.0 Search vendor "Theforeman" for product "Foreman" and version "3.0.0" | rc2 |
Affected
| ||||||
Redhat Search vendor "Redhat" | Satellite Search vendor "Redhat" for product "Satellite" | 6.0 Search vendor "Redhat" for product "Satellite" and version "6.0" | - |
Affected
|