Bug 1333378 (CVE-2016-3728) - CVE-2016-3728 foreman: Missing input validation in Smart Proxy allows RCE via TFTP file variant parameter
Summary: CVE-2016-3728 foreman: Missing input validation in Smart Proxy allows RCE via...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2016-3728
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1333405 1333408
Blocks: 1333386
TreeView+ depends on / blocked
 
Reported: 2016-05-05 12:00 UTC by Adam Mariš
Modified: 2021-02-17 03:55 UTC (History)
23 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
It was found that the “variant” parameter in the TFTP API of Foreman was passed to the eval() function. An attacker could possibly use this flaw to execute arbitrary code with the privileges of the Foreman user.
Clone Of:
: 1333405 1333408 (view as bug list)
Environment:
Last Closed: 2016-09-19 20:26:57 UTC


Attachments (Terms of Use)

Description Adam Mariš 2016-05-05 12:00:41 UTC
It was reported that TFTP API module in Smart Proxy is vulnerable to remote code execution via "variant" parameter, which is used to instantiate an implementation class using eval() on the user supplemented input.

Service is usually restricted in a default Foreman installation by requiring client SSL certificates and enforcing access to a configured list of trusted hosts, but may also be configured openly. The TFTP module is enabled in default installation, but may be disabled. Affected versions are 0.2 and higher.

Upstream bug:

http://projects.theforeman.org/issues/14931

Comment 1 Adam Mariš 2016-05-05 12:01:00 UTC
Acknowledgments:

Name: the Foreman project
Upstream: Lukas Zapletal (Red Hat)

Comment 3 Kurt Seifried 2016-09-19 20:26:57 UTC
This issue has been addressed in:

Satellite 6.2

In RHBA-2016:1501


Note You need to log in before you can comment on or make changes to this bug.