Bug 1327471 (CVE-2016-3693) - CVE-2016-3693 foreman: inspect in a provisioning template exposes sensitive controller information
Summary: CVE-2016-3693 foreman: inspect in a provisioning template exposes sensitive c...
Alias: CVE-2016-3693
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1359457
Blocks: 1327472 1432305
TreeView+ depends on / blocked
Reported: 2016-04-15 08:21 UTC by Andrej Nemec
Modified: 2021-10-21 00:52 UTC (History)
26 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
A flaw was found in the provisioning template handling in foreman. An attacker, with permissions to create templates, can cause internal Rails information to be displayed when it is processed, resulting in potentially sensitive information being disclosed.
Clone Of:
Last Closed: 2021-10-21 00:52:09 UTC

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:0336 0 normal SHIPPED_LIVE Important: Satellite 6.3 security, bug fix, and enhancement update 2018-02-21 22:43:42 UTC

Description Andrej Nemec 2016-04-15 08:21:34 UTC
Dominic Cleal of Red Hat reports:

A provisioning template containing <%= inspect %> will expose sensitive information about the Rails controller and application when rendered when using Safemode rendering (default).

Safemode is initialised with a "delegate" object that is typically the Rails controller. When inspect is called on it, all information about the Rails app is exposed, including routes, secret tokens, caches and so on.

External references:


Proposed fix:


Comment 3 Kurt Seifried 2017-07-13 00:48:10 UTC

Name: Dominic Cleal (Red Hat)

Comment 5 errata-xmlrpc 2018-02-21 12:26:21 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 6.3 for RHEL 7

Via RHSA-2018:0336 https://access.redhat.com/errata/RHSA-2018:0336

Note You need to log in before you can comment on or make changes to this bug.