Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1339889 - (CVE-2016-4451) CVE-2016-4451 foreman: privilege escalation through Organization and Locations API
CVE-2016-4451 foreman: privilege escalation through Organization and Location...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20160525,repor...
: Security
Depends On: 1340107
Blocks: 1339890 1432305
  Show dependency treegraph
 
Reported: 2016-05-26 01:36 EDT by Martin Prpič
Modified: 2018-02-21 07:27 EST (History)
28 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
It was found that Satellite 6 did not properly enforce access controls on certain resources. An attacker, with access to the API and knowledge of the ID name, can potentially access other resources in other organizations.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:0336 normal SHIPPED_LIVE Important: Satellite 6.3 security, bug fix, and enhancement update 2018-02-21 17:43:42 EST

  None (edit)
Description Martin Prpič 2016-05-26 01:36:10 EDT
Marek Hulán of Red Hat reports:

When accessing Foreman as a user limited to specific organization, having access to other organization IDs and having unlimited filters could allow a user to access/modify other organization data by using the organization ID as an API parameter.

Upstream bug:

http://projects.theforeman.org/issues/15182

Upstream patch:

https://github.com/theforeman/foreman/pull/3553/commits/42066cfa19de316449954079c07bdf1e4cc5eb0a
Comment 2 Kurt Seifried 2017-07-14 21:57:26 EDT
Acknowledgments:

Name: Marek Hulán (Red Hat)
Comment 4 errata-xmlrpc 2018-02-21 07:27:16 EST
This issue has been addressed in the following products:

  Red Hat Satellite 6.3 for RHEL 7

Via RHSA-2018:0336 https://access.redhat.com/errata/RHSA-2018:0336

Note You need to log in before you can comment on or make changes to this bug.