Bug 1339889 (CVE-2016-4451) - CVE-2016-4451 foreman: privilege escalation through Organization and Locations API
Summary: CVE-2016-4451 foreman: privilege escalation through Organization and Location...
Status: NEW
Alias: CVE-2016-4451
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Whiteboard: impact=moderate,public=20160525,repor...
Keywords: Security
Depends On: 1340107
Blocks: 1339890 1432305
TreeView+ depends on / blocked
Reported: 2016-05-26 05:36 UTC by Martin Prpič
Modified: 2019-06-08 21:13 UTC (History)
27 users (show)

It was found that Satellite 6 did not properly enforce access controls on certain resources. An attacker, with access to the API and knowledge of the ID name, can potentially access other resources in other organizations.
Clone Of:
Last Closed:

Attachments (Terms of Use)

External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:0336 normal SHIPPED_LIVE Important: Satellite 6.3 security, bug fix, and enhancement update 2018-02-21 22:43:42 UTC

Description Martin Prpič 2016-05-26 05:36:10 UTC
Marek Hulán of Red Hat reports:

When accessing Foreman as a user limited to specific organization, having access to other organization IDs and having unlimited filters could allow a user to access/modify other organization data by using the organization ID as an API parameter.

Upstream bug:


Upstream patch:


Comment 2 Kurt Seifried 2017-07-15 01:57:26 UTC

Name: Marek Hulán (Red Hat)

Comment 4 errata-xmlrpc 2018-02-21 12:27:16 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 6.3 for RHEL 7

Via RHSA-2018:0336 https://access.redhat.com/errata/RHSA-2018:0336

Note You need to log in before you can comment on or make changes to this bug.