Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1629063 - (CVE-2018-14643) CVE-2018-14643 smart_proxy_dynflow: Authentication bypass in Foreman remote execution feature
CVE-2018-14643 smart_proxy_dynflow: Authentication bypass in Foreman remote e...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
urgent Severity urgent
: ---
: ---
Assigned To: Red Hat Product Security
impact=critical,public=20180920,repor...
: Security
Depends On: 1629003 1630489 1630490 1630491 1630492
Blocks: 1629064
  Show dependency treegraph
 
Reported: 2018-09-14 14:55 EDT by Pedro Sampaio
Modified: 2018-10-17 10:41 EDT (History)
13 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
An authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulnerable Foreman instances, in a highly privileged context.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2018-10-17 10:41:43 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:2733 None None None 2018-09-20 13:21 EDT

  None (edit)
Description Pedro Sampaio 2018-09-14 14:55:00 EDT
A vulnerability was discovered in the Foreman Remote Execution feature, allowing an unauthorized remote attacker to perform arbitrary code execution on managed hosts. The issue affects the component smart_proxy_dynflow 0.1.8 and later (Foreman >= 1.15, Satellite >= 6.3)

Introducing commit:

https://github.com/theforeman/smart_proxy_dynflow/commit/cb7b0b5c9b602f737ab4c6e9fb47c158241cf49c#diff-6dee70f4339cfc3dd8cedfc2a34f14c2

References:

https://bugzilla.redhat.com/show_bug.cgi?id=1629003
Comment 6 Richard Maciel Costa 2018-09-18 15:26:35 EDT
Mitigation:

Disable Smart Proxy Dynflow by setting the :enabled: option to false in the /etc/foreman-proxy/settings.d/dynflow.yml file.
Comment 7 Richard Maciel Costa 2018-09-19 09:21:52 EDT
Acknowledgments:

Name: Ivan Necas (Red Hat)
Comment 9 errata-xmlrpc 2018-09-20 13:21:04 EDT
This issue has been addressed in the following products:

  Red Hat Satellite 6.3 for RHEL 7

Via RHSA-2018:2733 https://access.redhat.com/errata/RHSA-2018:2733
Comment 10 Klaas Demter 2018-09-20 13:28:24 EDT
Is there an upstream fix?

Note You need to log in before you can comment on or make changes to this bug.