Red Hat Bugzilla – Bug 1629063
CVE-2018-14643 smart_proxy_dynflow: Authentication bypass in Foreman remote execution feature
Last modified: 2018-10-17 10:41:43 EDT
A vulnerability was discovered in the Foreman Remote Execution feature, allowing an unauthorized remote attacker to perform arbitrary code execution on managed hosts. The issue affects the component smart_proxy_dynflow 0.1.8 and later (Foreman >= 1.15, Satellite >= 6.3) Introducing commit: https://github.com/theforeman/smart_proxy_dynflow/commit/cb7b0b5c9b602f737ab4c6e9fb47c158241cf49c#diff-6dee70f4339cfc3dd8cedfc2a34f14c2 References: https://bugzilla.redhat.com/show_bug.cgi?id=1629003
Mitigation: Disable Smart Proxy Dynflow by setting the :enabled: option to false in the /etc/foreman-proxy/settings.d/dynflow.yml file.
Acknowledgments: Name: Ivan Necas (Red Hat)
This issue has been addressed in the following products: Red Hat Satellite 6.3 for RHEL 7 Via RHSA-2018:2733 https://access.redhat.com/errata/RHSA-2018:2733
Is there an upstream fix?
https://github.com/theforeman/smart_proxy_dynflow/pull/54