Bug 1948005 (CVE-2021-3494) - CVE-2021-3494 foreman: possible man-in-the-middle in smart_proxy realm_freeipa
Summary: CVE-2021-3494 foreman: possible man-in-the-middle in smart_proxy realm_freeipa
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2021-3494
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1948006
Blocks: 1941405 1948686
TreeView+ depends on / blocked
 
Reported: 2021-04-09 18:05 UTC by Yadnyawalk Tale
Modified: 2021-12-14 18:47 UTC (History)
12 users (show)

Fixed In Version: foreman 2.5.0
Doc Type: ---
Doc Text:
A smart proxy that provides a restful API to various sub-systems of the Foreman is affected by the flaw which can cause a Man-in-the-Middle attack. The FreeIPA module of Foreman smart proxy does not check the SSL certificate, thus, an unauthenticated attacker can perform actions in FreeIPA if certain conditions are met. The highest threat from this flaw is to system confidentiality.
Clone Of:
Environment:
Last Closed: 2021-11-13 15:51:16 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:4702 0 None None None 2021-11-16 14:08:06 UTC

Description Yadnyawalk Tale 2021-04-09 18:05:59 UTC
The realm_freeipa module of Foreman smart proxy suffers from a flaw that can be exploited as a man-in-the-middle attack. The module does not check the SSL certificate and if certain conditions are met, can perform actions in FreeIPA as the Foreman user.

Comment 1 Yadnyawalk Tale 2021-04-09 18:06:04 UTC
Acknowledgments:

Name: Evgeni Golov (Red Hat)
Upstream: Foreman project

Comment 2 Yadnyawalk Tale 2021-04-09 18:08:16 UTC
Mitigation:

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Comment 6 errata-xmlrpc 2021-11-16 14:08:04 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 6.10 for RHEL 7

Via RHSA-2021:4702 https://access.redhat.com/errata/RHSA-2021:4702


Note You need to log in before you can comment on or make changes to this bug.