Bug 1375089 (CVE-2016-7040) - CVE-2016-7040 cfme: Incorrect sanitization in regular expression engine
Summary: CVE-2016-7040 cfme: Incorrect sanitization in regular expression engine
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2016-7040
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1376878 1401601
Blocks: 1375092
TreeView+ depends on / blocked
 
Reported: 2016-09-12 07:24 UTC by Adam Mariš
Modified: 2021-02-17 03:21 UTC (History)
17 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
An input validation flaw was found in the way CloudForms regular expressions were passed to the expression engine via both the JSON API and the web based UI. A user with the ability to view collections and filter them could use this flaw to execute arbitrary shell commands on the host with the privileges of the CloudForms process.
Clone Of:
Environment:
Last Closed: 2016-10-04 17:34:45 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:1996 0 normal SHIPPED_LIVE Important: CFME 4.1 bug fixes and enhancement update 2016-10-04 18:26:13 UTC

Description Adam Mariš 2016-09-12 07:24:40 UTC
In ManageIQ product there was found an improper input validation vulnerability in expression engine allowing to trigger code execution. The issue was found to be exploitable both via JSON API, which can be triggered by users authorized with GET/read access to a collection in API, and via UI when filtering on VMs based on regular expression, which can be triggered by users able to view and filter on VMs in UI.

Comment 1 Adam Mariš 2016-09-12 07:25:00 UTC
Acknowledgments:

Name: Tim Wade (Red Hat)

Comment 4 errata-xmlrpc 2016-10-04 14:36:45 UTC
This issue has been addressed in the following products:

  CloudForms Management Engine 5.6

Via RHSA-2016:1996 https://rhn.redhat.com/errata/RHSA-2016-1996.html


Note You need to log in before you can comment on or make changes to this bug.