Lucene search

K
cvelistRedhatCVELIST:CVE-2023-0118
HistorySep 20, 2023 - 1:39 p.m.

CVE-2023-0118 Foreman: arbitrary code execution through templates

2023-09-2013:39:27
CWE-78
redhat
www.cve.org
5
cve-2023-0118
foreman
templates
admin user
safe mode
operating system

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.002

Percentile

53.0%

An arbitrary code execution flaw was found in Foreman. This flaw allows an admin user to bypass safe mode in templates and execute arbitrary code on the underlying operating system.

CNA Affected

[
  {
    "packageName": "foreman",
    "collectionURL": "https://github.com/theforeman/foreman",
    "defaultStatus": "affected"
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Satellite 6.11 for RHEL 7",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "foreman",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "0:3.1.1.27-1.el7sat",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:satellite_capsule:6.11::el8",
      "cpe:/a:redhat:satellite_capsule:6.11::el7",
      "cpe:/a:redhat:satellite_utils:6.11::el8",
      "cpe:/a:redhat:satellite:6.11::el7",
      "cpe:/a:redhat:satellite_utils:6.11::el7",
      "cpe:/a:redhat:satellite:6.11::el8"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Satellite 6.11 for RHEL 7",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "foreman",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "0:3.1.1.27-1.el7sat",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:satellite_capsule:6.11::el8",
      "cpe:/a:redhat:satellite_capsule:6.11::el7",
      "cpe:/a:redhat:satellite_utils:6.11::el8",
      "cpe:/a:redhat:satellite:6.11::el7",
      "cpe:/a:redhat:satellite_utils:6.11::el7",
      "cpe:/a:redhat:satellite:6.11::el8"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Satellite 6.11 for RHEL 8",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "foreman",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "0:3.1.1.27-1.el8sat",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:satellite_capsule:6.11::el8",
      "cpe:/a:redhat:satellite_capsule:6.11::el7",
      "cpe:/a:redhat:satellite_utils:6.11::el8",
      "cpe:/a:redhat:satellite:6.11::el7",
      "cpe:/a:redhat:satellite_utils:6.11::el7",
      "cpe:/a:redhat:satellite:6.11::el8"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Satellite 6.11 for RHEL 8",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "foreman",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "0:3.1.1.27-1.el8sat",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:satellite_capsule:6.11::el8",
      "cpe:/a:redhat:satellite_capsule:6.11::el7",
      "cpe:/a:redhat:satellite_utils:6.11::el8",
      "cpe:/a:redhat:satellite:6.11::el7",
      "cpe:/a:redhat:satellite_utils:6.11::el7",
      "cpe:/a:redhat:satellite:6.11::el8"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Satellite 6.12 for RHEL 8",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "rubygem-safemode",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "0:1.3.8-1.el8sat",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:satellite:6.12::el8",
      "cpe:/a:redhat:satellite_capsule:6.12::el8",
      "cpe:/a:redhat:satellite_utils:6.12::el8"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Satellite 6.13 for RHEL 8",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "rubygem-safemode",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "0:1.3.8-1.el8sat",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:satellite_capsule:6.13::el8",
      "cpe:/a:redhat:satellite_utils:6.13::el8",
      "cpe:/a:redhat:satellite_maintenance:6.13::el8",
      "cpe:/a:redhat:satellite:6.13::el8"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Satellite 6.14 for RHEL 8",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "foreman",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "0:3.7.0.9-1.el8sat",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:satellite_maintenance:6.14::el8",
      "cpe:/a:redhat:satellite_utils:6.14::el8",
      "cpe:/a:redhat:satellite:6.14::el8",
      "cpe:/a:redhat:satellite_capsule:6.14::el8"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Satellite 6.14 for RHEL 8",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "foreman",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "0:3.7.0.9-1.el8sat",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:satellite_maintenance:6.14::el8",
      "cpe:/a:redhat:satellite_utils:6.14::el8",
      "cpe:/a:redhat:satellite:6.14::el8",
      "cpe:/a:redhat:satellite_capsule:6.14::el8"
    ]
  }
]

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.002

Percentile

53.0%