Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Foreman
(Theforeman)Repositories |
• https://github.com/theforeman/foreman
• https://github.com/theforeman/smart-proxy |
#Vulnerabilities | 69 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2014-07-01 | CVE-2014-3492 | Multiple cross-site scripting (XSS) vulnerabilities in the host YAML view in Foreman before 1.4.5 and 1.5.x before 1.5.1 allow remote attackers to inject arbitrary web script or HTML via a parameter (1) name or (2) value related to the host. | Foreman | N/A | ||
2014-07-01 | CVE-2014-3491 | Cross-site scripting (XSS) vulnerability in Foreman before 1.4.5 and 1.5.x before 1.5.1 allows remote attackers to inject arbitrary web script or HTML via the Name field to the New Host groups page, related to create, update, and destroy notification boxes. | Foreman | N/A | ||
2014-05-08 | CVE-2013-0210 | The smart proxy Puppet run API in Foreman before 1.2.0 allows remote attackers to execute arbitrary commands via vectors related to escaping and Puppet commands. | Foreman | N/A | ||
2014-05-08 | CVE-2013-0187 | Foreman before 1.1 allows remote authenticated users to gain privileges via a (1) XMLHttpRequest or (2) AJAX request. | Foreman | N/A | ||
2014-05-08 | CVE-2013-0174 | The external node classifier (ENC) API in Foreman before 1.1 allows remote attackers to obtain the hashed root password via an API request. | Foreman | N/A | ||
2014-05-08 | CVE-2013-0173 | Foreman before 1.1 uses a salt of "foreman" to hash root passwords, which makes it easier for attackers to guess the password via a brute force attack. | Foreman | N/A | ||
2014-05-08 | CVE-2013-0171 | Foreman before 1.1 allows remote attackers to execute arbitrary code via a crafted YAML object to the (1) fact or (2) report import API. | Foreman | N/A | ||
2014-04-04 | CVE-2012-5648 | Multiple SQL injection vulnerabilities in Foreman before 1.0.2 allow remote attackers to execute arbitrary SQL commands via unspecified parameters to (1) app/models/hostext/search.rb or (2) app/models/puppetclass.rb, related to the search mechanism. | Foreman | N/A | ||
2014-05-08 | CVE-2012-5477 | The smart proxy in Foreman before 1.1 uses a umask set to 0, which allows local users to modify files created by the daemon via unspecified vectors. | Foreman | N/A |