On Foreman, Shellhooks plugin for smart-proxy introduce a flaw which allows any client to perform actions of Foreman Server.
Acknowledgments: Name: Evgeni Golov (Red Hat) Upstream: Foreman project
Upstream patch: https://github.com/theforeman/smart_proxy_shellhooks/commit/35dafbf9db69a54ed501cebaae748ecce5d901df
Statement: Red Hat Satellite 6 does not ship the smart_proxy_shellhooks plugin, which is affected by the vulnerability. This flaw affects upstream Foreman only.
Mitigation: To mitigate the flaw, disable the smart_proxy_shellhooks plugin from the Server.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-3457