CVE-2023-0118
Foreman: arbitrary code execution through templates
Severity Score
9.1
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track*
*SSVC
Descriptions
An arbitrary code execution flaw was found in Foreman. This flaw allows an admin user to bypass safe mode in templates and execute arbitrary code on the underlying operating system.
Se encontró una falla en la ejecución de código arbitrario en Foreman. Esta falla permite a un usuario administrador omitir el modo seguro en las plantillas y ejecutar código arbitrario en el sistema operativo subyacente.
*Credits:
Red Hat would like to thank Andrew Danau (Onsec.io) for reporting this issue.
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track*
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2023-01-09 CVE Reserved
- 2023-08-04 CVE Published
- 2024-09-17 CVE Updated
- 2024-09-26 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (6)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2023:4466 | 2024-05-03 | |
https://access.redhat.com/errata/RHSA-2023:5979 | 2024-05-03 | |
https://access.redhat.com/errata/RHSA-2023:5980 | 2024-05-03 | |
https://access.redhat.com/errata/RHSA-2023:6818 | 2024-05-03 | |
https://access.redhat.com/security/cve/CVE-2023-0118 | 2023-11-08 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2159291 | 2023-11-08 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Satellite Search vendor "Redhat" for product "Satellite" | >= 6.13 < 6.13.3 Search vendor "Redhat" for product "Satellite" and version " >= 6.13 < 6.13.3" | - |
Affected
| in | Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 8.0 Search vendor "Redhat" for product "Enterprise Linux" and version "8.0" | - |
Safe
|
Theforeman Search vendor "Theforeman" | Foreman Search vendor "Theforeman" for product "Foreman" | * | - |
Affected
|