Bug 1968439 (CVE-2021-3584) - CVE-2021-3584 foreman: Authenticate remote code execution through Sendmail configuration
Summary: CVE-2021-3584 foreman: Authenticate remote code execution through Sendmail co...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2021-3584
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1968443
Blocks: 1968362 1968688
TreeView+ depends on / blocked
 
Reported: 2021-06-07 12:19 UTC by Yadnyawalk Tale
Modified: 2022-07-05 19:25 UTC (History)
18 users (show)

Fixed In Version: foreman 2.4.1, foreman 2.5.1, foreman 3.0.0
Doc Type: If docs needed, set a value
Doc Text:
A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injection. The highest threat from this vulnerability is to confidentiality, integrity and availability of system.
Clone Of:
Environment:
Last Closed: 2022-07-05 19:25:24 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2022:5498 0 None None None 2022-07-05 14:26:36 UTC

Description Yadnyawalk Tale 2021-06-07 12:19:35 UTC
Foreman upstream is affected by the remote code execution flaw which allows authenticated attacker to perform remote code execution attack. In this type of vulnerability an attacker is able to run command of their choosing with system level privileges on a server that possesses the appropriate weakness but this is only possible when attacker have gain some high-level privileges on the Foreman.

Comment 5 errata-xmlrpc 2022-07-05 14:26:33 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 6.11 for RHEL 7
  Red Hat Satellite 6.11 for RHEL 8

Via RHSA-2022:5498 https://access.redhat.com/errata/RHSA-2022:5498

Comment 6 Product Security DevOps Team 2022-07-05 19:25:21 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-3584


Note You need to log in before you can comment on or make changes to this bug.