An arbitrary code execution flaw was found in Foreman. This flaw allows an admin user to bypass safe mode in templates and execute arbitrary code on the underlying operating system.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/errata/RHSA-2023:4466 | Release Notes Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2023:5979 | |
| https://access.redhat.com/errata/RHSA-2023:5980 | |
| https://access.redhat.com/errata/RHSA-2023:6818 | |
| https://access.redhat.com/security/cve/CVE-2023-0118 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2159291 | Issue Tracking Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2023:4466 | Release Notes Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2023:5979 | |
| https://access.redhat.com/errata/RHSA-2023:5980 | |
| https://access.redhat.com/errata/RHSA-2023:6818 | |
| https://access.redhat.com/security/cve/CVE-2023-0118 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2159291 | Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-09-20 14:15
Updated : 2024-11-21 07:36
NVD link : CVE-2023-0118
Mitre link : CVE-2023-0118
CVE.ORG link : CVE-2023-0118
JSON object : View
Products Affected
theforeman
- foreman
redhat
- enterprise_linux
- satellite
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
