A vulnerability was discovered in the Foreman Remote Execution feature, allowing an unauthorized remote attacker to perform arbitrary code execution on managed hosts. The issue affects the component smart_proxy_dynflow 0.1.8 and later (Foreman >= 1.15, Satellite >= 6.3) Introducing commit: https://github.com/theforeman/smart_proxy_dynflow/commit/cb7b0b5c9b602f737ab4c6e9fb47c158241cf49c#diff-6dee70f4339cfc3dd8cedfc2a34f14c2 References: https://bugzilla.redhat.com/show_bug.cgi?id=1629003
Mitigation: Disable Smart Proxy Dynflow by setting the :enabled: option to false in the /etc/foreman-proxy/settings.d/dynflow.yml file.
Acknowledgments: Name: Ivan Necas (Red Hat)
This issue has been addressed in the following products: Red Hat Satellite 6.3 for RHEL 7 Via RHSA-2018:2733 https://access.redhat.com/errata/RHSA-2018:2733
Is there an upstream fix?
https://github.com/theforeman/smart_proxy_dynflow/pull/54