theforeman CVE Vulnerabilities & Metrics

Focus on theforeman vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About theforeman Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with theforeman. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total theforeman CVEs: 66
Earliest CVE date: 25 Aug 2012, 10:29 UTC
Latest CVE date: 12 Aug 2024, 17:15 UTC

Latest CVE reference: CVE-2024-7700

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -75.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -75.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical theforeman CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.53

Max CVSS: 10.0

Critical CVEs (≥9): 2

CVSS Range vs. Count

Range Count
0.0-3.9 28
4.0-6.9 51
7.0-8.9 7
9.0-10.0 2

CVSS Distribution Chart

Top 5 Highest CVSS theforeman CVEs

These are the five CVEs with the highest CVSS scores for theforeman, sorted by severity first and recency.

All CVEs for theforeman

CVE-2024-7700 theforeman vulnerability CVSS: 0 12 Aug 2024, 17:15 UTC

A command injection flaw was found in the "Host Init Config" template in the Foreman application via the "Install Packages" field on the "Register Host" page. This flaw allows an attacker with the necessary privileges to inject arbitrary commands into the configuration, potentially allowing unauthorized command execution during host registration. Although this issue requires user interaction to execute injected commands, it poses a significant risk if an unsuspecting user runs the generated registration script.

CVE-2023-4886 theforeman vulnerability CVSS: 0 03 Oct 2023, 15:15 UTC

A sensitive information exposure vulnerability was found in foreman. Contents of tomcat's server.xml file, which contain passwords to candlepin's keystore and truststore, were found to be world readable.

CVE-2022-3874 theforeman vulnerability CVSS: 0 22 Sep 2023, 14:15 UTC

A command injection flaw was found in foreman. This flaw allows an authenticated user with admin privileges on the foreman instance to transpile commands through CoreOS and Fedora CoreOS configurations in templates, possibly resulting in arbitrary command execution on the underlying operating system.

CVE-2023-0462 theforeman vulnerability CVSS: 0 20 Sep 2023, 14:15 UTC

An arbitrary code execution flaw was found in Foreman. This issue may allow an admin user to execute arbitrary code on the underlying operating system by setting global parameters with a YAML payload.

CVE-2023-0118 theforeman vulnerability CVSS: 0 20 Sep 2023, 14:15 UTC

An arbitrary code execution flaw was found in Foreman. This flaw allows an admin user to bypass safe mode in templates and execute arbitrary code on the underlying operating system.

CVE-2021-20260 theforeman vulnerability CVSS: 0 26 Aug 2022, 16:15 UTC

A flaw was found in the Foreman project. The Datacenter plugin exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVE-2021-3590 theforeman vulnerability CVSS: 0 22 Aug 2022, 15:15 UTC

A flaw was found in Foreman project. A credential leak was identified which will expose Azure Compute Profile password through JSON of the API output. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVE-2020-10710 theforeman vulnerability CVSS: 0 16 Aug 2022, 21:15 UTC

A flaw was found where the Plaintext Candlepin password is disclosed while updating Red Hat Satellite through the satellite-installer. This flaw allows an attacker with sufficiently high privileges, such as root, to retrieve the Candlepin plaintext password.

CVE-2021-3456 theforeman vulnerability CVSS: 3.6 30 Mar 2022, 16:15 UTC

An improper authorization handling flaw was found in Foreman. The Salt plugin for the smart-proxy allows foreman clients to execute actions that should be limited to the Foreman Server. This flaw allows an authenticated local attacker to access and delete limited resources and also causes a denial of service on the Foreman server. The highest threat from this vulnerability is to integrity and system availability.

CVE-2021-20290 theforeman vulnerability CVSS: 3.6 25 Mar 2022, 19:15 UTC

An improper authorization handling flaw was found in Foreman. The OpenSCAP plugin for the smart-proxy allows foreman clients to execute actions that should be limited to the Foreman Server. This flaw allows an authenticated local attacker to access and delete limited resources and also causes a denial of service on the Foreman server. The highest threat from this vulnerability is to integrity and system availability.

CVE-2021-3584 theforeman vulnerability CVSS: 9.0 23 Dec 2021, 20:15 UTC

A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injection. The highest threat from this vulnerability is to confidentiality, integrity and availability of system. Fixed releases are 2.4.1, 2.5.1, 3.0.0.

CVE-2021-20259 theforeman vulnerability CVSS: 4.6 07 Jun 2021, 21:15 UTC

A flaw was found in the Foreman project. The Proxmox compute resource exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Versions before foreman_fog_proxmox 0.13.1 are affected

CVE-2021-3469 theforeman vulnerability CVSS: 3.5 03 Jun 2021, 20:15 UTC

Foreman versions before 2.3.4 and before 2.4.0 is affected by an improper authorization handling flaw. An authenticated attacker can impersonate the foreman-proxy if product enable the Puppet Certificate authority (CA) to sign certificate requests that have subject alternative names (SANs). Foreman do not enable SANs by default and `allow-authorization-extensions` is set to `false` unless user change `/etc/puppetlabs/puppetserver/conf.d/ca.conf` configuration explicitly.

CVE-2021-3457 theforeman vulnerability CVSS: 3.6 12 May 2021, 15:15 UTC

An improper authorization handling flaw was found in Foreman. The Shellhooks plugin for the smart-proxy allows Foreman clients to execute actions that should be limited to the Foreman Server. This flaw allows an authenticated local attacker to access and delete limited resources and also causes a denial of service on the Foreman server. The highest threat from this vulnerability is to integrity and system availability.

CVE-2021-3494 theforeman vulnerability CVSS: 4.3 26 Apr 2021, 15:15 UTC

A smart proxy that provides a restful API to various sub-systems of the Foreman is affected by the flaw which can cause a Man-in-the-Middle attack. The FreeIPA module of Foreman smart proxy does not check the SSL certificate, thus, an unauthenticated attacker can perform actions in FreeIPA if certain conditions are met. The highest threat from this flaw is to system confidentiality. This flaw affects Foreman versions before 2.5.0.

CVE-2021-3413 theforeman vulnerability CVSS: 6.5 08 Apr 2021, 23:15 UTC

A flaw was found in Red Hat Satellite in tfm-rubygem-foreman_azure_rm in versions before 2.2.0. A credential leak was identified which will expose Azure Resource Manager's secret key through JSON of the API output. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVE-2014-0241 theforeman vulnerability CVSS: 2.1 13 Dec 2019, 13:15 UTC

rubygem-hammer_cli_foreman: File /etc/hammer/cli.modules.d/foreman.yml world readable

CVE-2014-0091 theforeman vulnerability CVSS: 5.0 11 Dec 2019, 15:15 UTC

Foreman has improper input validation which could lead to partial Denial of Service

CVE-2013-4120 theforeman vulnerability CVSS: 5.0 10 Dec 2019, 15:15 UTC

Katello has a Denial of Service vulnerability in API OAuth authentication

CVE-2013-0283 theforeman vulnerability CVSS: 3.5 05 Dec 2019, 17:15 UTC

Katello: Username in Notification page has cross site scripting

CVE-2013-2101 theforeman vulnerability CVSS: 3.5 03 Dec 2019, 14:15 UTC

Katello has multiple XSS issues in various entities

CVE-2019-14825 theforeman vulnerability CVSS: 4.0 25 Nov 2019, 16:15 UTC

A cleartext password storage issue was discovered in Katello, versions 3.x.x.x before katello 3.12.0.9. Registry credentials used during container image discovery were inadvertently logged without being masked. This flaw could expose the registry credentials to other privileged users.

CVE-2014-8183 theforeman vulnerability CVSS: 6.5 01 Aug 2019, 14:15 UTC

It was found that foreman, versions 1.x.x before 1.15.6, in Satellite 6 did not properly enforce access controls on certain resources. An attacker with access to the API and knowledge of the resource name can access resources in other organizations.

CVE-2019-10198 theforeman vulnerability CVSS: 4.0 31 Jul 2019, 22:15 UTC

An authentication bypass vulnerability was discovered in foreman-tasks before 0.15.7. Previously, commit tasks were searched through find_resource, which performed authorization checks. After the change to Foreman, an unauthenticated user can view the details of a task through the web UI or API, if they can discover or guess the UUID of the task.

CVE-2019-3893 theforeman vulnerability CVSS: 4.0 09 Apr 2019, 16:29 UTC

In Foreman it was discovered that the delete compute resource operation, when executed from the Foreman API, leads to the disclosure of the plaintext password or token for the affected compute resource. A malicious user with the "delete_compute_resource" permission can use this flaw to take control over compute resources managed by foreman. Versions before 1.20.3, 1.21.1, 1.22.0 are vulnerable.

CVE-2018-16887 theforeman vulnerability CVSS: 3.5 13 Jan 2019, 02:29 UTC

A cross-site scripting (XSS) flaw was found in the katello component of Satellite. An attacker with privilege to create/edit organizations and locations is able to execute a XSS attacks against other users through the Subscriptions or the Red Hat Repositories wizards. This can possibly lead to malicious code execution and extraction of the anti-CSRF token of higher privileged users. Versions before 3.9.0 are vulnerable.

CVE-2018-14623 theforeman vulnerability CVSS: 4.0 14 Dec 2018, 00:29 UTC

A SQL injection flaw was found in katello's errata-related API. An authenticated remote attacker can craft input data to force a malformed SQL query to the backend database, which will leak internal IDs. This is issue is related to an incomplete fix for CVE-2016-3072. Version 3.10 and older is vulnerable.

CVE-2018-16861 theforeman vulnerability CVSS: 3.5 07 Dec 2018, 19:29 UTC

A cross-site scripting (XSS) flaw was found in the foreman component of satellite. An attacker with privilege to create entries using the Hosts, Monitor, Infrastructure, or Administer Menus is able to execute a XSS attacks against other users, possibly leading to malicious code execution and extraction of the anti-CSRF token of higher privileged users. Foreman before 1.18.3, 1.19.1, and 1.20.0 are vulnerable.

CVE-2018-14664 theforeman vulnerability CVSS: 3.5 12 Oct 2018, 22:15 UTC

A flaw was found in foreman from versions 1.18. A stored cross-site scripting vulnerability exists due to an improperly escaped HTML code in the breadcrumbs bar. This allows a user with permissions to edit which attribute is used in the breadcrumbs bar to store code that will be executed on the client side.

CVE-2018-14643 theforeman vulnerability CVSS: 10.0 21 Sep 2018, 13:29 UTC

An authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulnerable Foreman instances, in a highly privileged context.

CVE-2016-7078 theforeman vulnerability CVSS: 4.0 10 Sep 2018, 15:29 UTC

foreman before version 1.15.0 is vulnerable to an information leak through organizations and locations feature. When a user is assigned _no_ organizations/locations, they are able to view all resources instead of none (mirroring an administrator's view). The user's actions are still limited by their assigned permissions, e.g. to control viewing, editing and deletion.

CVE-2016-7077 theforeman vulnerability CVSS: 4.0 10 Sep 2018, 15:29 UTC

foreman before 1.14.0 is vulnerable to an information leak. It was found that Foreman form helper does not authorize options for associated objects. Unauthorized user can see names of such objects if their count is less than 6.

CVE-2017-2662 theforeman vulnerability CVSS: 4.0 22 Aug 2018, 16:29 UTC

A flaw was found in Foreman's katello plugin version 3.4.5. After setting a new role to allow restricted access on a repository with a filter (filter set on the Product Name), the filter is not respected when the actions are done via hammer using the repository id.

CVE-2016-8639 theforeman vulnerability CVSS: 3.5 01 Aug 2018, 13:29 UTC

It was found that foreman before 1.13.0 is vulnerable to a stored XSS via an organization or location name. This could allow an attacker with privileges to set the organization or location name to display arbitrary HTML including scripting code within the web interface.

CVE-2016-8634 theforeman vulnerability CVSS: 3.5 01 Aug 2018, 12:29 UTC

A vulnerability was found in foreman 1.14.0. When creating an organization or location in Foreman, if the name contains HTML then the second step of the wizard (/organizations/id/step2) will render the HTML. This occurs in the alertbox on the page. The result is a stored XSS attack if an organization/location with HTML in the name is created, then a user is linked directly to this URL.

CVE-2016-8613 theforeman vulnerability CVSS: 4.3 31 Jul 2018, 20:29 UTC

A flaw was found in foreman 1.5.1. The remote execution plugin runs commands on hosts over SSH from the Foreman web UI. When a job is submitted that contains HTML tags, the console output shown in the web UI does not escape the output causing any HTML or JavaScript to run in the user's browser. The output of the job is stored, making this a stored XSS vulnerability.

CVE-2016-9595 theforeman vulnerability CVSS: 3.6 27 Jul 2018, 18:29 UTC

A flaw was found in katello-debug before 3.4.0 where certain scripts and log files used insecure temporary files. A local user could exploit this flaw to conduct a symbolic-link attack, allowing them to overwrite the contents of arbitrary files.

CVE-2017-7535 theforeman vulnerability CVSS: 4.3 26 Jul 2018, 13:29 UTC

foreman before version 1.16.0 is vulnerable to a stored XSS in organizations/locations assignment to hosts. Exploiting this requires a user to actively assign hosts to an organization that contains html in its name which is visible to the user prior to taking action.

CVE-2017-2672 theforeman vulnerability CVSS: 4.0 21 Jun 2018, 13:29 UTC

A flaw was found in foreman before version 1.15 in the logging of adding and registering images. An attacker with access to the foreman log file would be able to view passwords for provisioned systems in the log file, allowing them to access those systems.

CVE-2016-9593 theforeman vulnerability CVSS: 4.0 16 Apr 2018, 15:29 UTC

foreman-debug before version 1.15.0 is vulnerable to a flaw in foreman-debug's logging. An attacker with access to the foreman log file would be able to view passwords, allowing them to access those systems.

CVE-2018-1096 theforeman vulnerability CVSS: 4.0 05 Apr 2018, 21:29 UTC

An input sanitization flaw was found in the id field in the dashboard controller of Foreman before 1.16.1. A user could use this flaw to perform an SQL injection attack on the back end database.

CVE-2018-1097 theforeman vulnerability CVSS: 4.0 04 Apr 2018, 21:29 UTC

A flaw was found in foreman before 1.16.1. The issue allows users with limited permissions for powering oVirt/RHV hosts on and off to discover the username and password used to connect to the compute resource.

CVE-2017-2667 theforeman vulnerability CVSS: 6.8 12 Mar 2018, 15:29 UTC

Hammer CLI, a CLI utility for Foreman, before version 0.10.0, did not explicitly set the verify_ssl flag for apipie-bindings that disable it by default. As a result the server certificates are not checked and connections are prone to man-in-the-middle attacks.

CVE-2017-15100 theforeman vulnerability CVSS: 4.3 27 Nov 2017, 14:29 UTC

An attacker submitting facts to the Foreman server containing HTML can cause a stored XSS on certain pages: (1) Facts page, when clicking on the "chart" button and hovering over the chart; (2) Trends page, when checking the graph for a trend based on a such fact; (3) Statistics page, for facts that are aggregated on this page.

CVE-2014-3531 theforeman vulnerability CVSS: 3.5 18 Oct 2017, 14:29 UTC

Multiple cross-site scripting (XSS) vulnerabilities in Foreman before 1.5.2 allow remote authenticated users to inject arbitrary web script or HTML via the operating system (1) name or (2) description.

CVE-2014-0208 theforeman vulnerability CVSS: 3.5 16 Oct 2017, 18:29 UTC

Cross-site scripting (XSS) vulnerability in the search auto-completion functionality in Foreman before 1.4.4 allows remote authenticated users to inject arbitrary web script or HTML via a crafted key name.

CVE-2015-5246 theforeman vulnerability CVSS: 6.8 06 Oct 2017, 15:29 UTC

The LDAP Authentication functionality in Foreman might allow remote attackers with knowledge of old passwords to gain access via vectors involving the password lifetime period in Active Directory.

CVE-2015-5282 theforeman vulnerability CVSS: 4.3 25 Sep 2017, 17:29 UTC

Cross-site scripting (XSS) vulnerability in Foreman 1.7.0 and after.

CVE-2015-5152 theforeman vulnerability CVSS: 4.3 17 Jul 2017, 13:18 UTC

Foreman after 1.1 and before 1.9.0-RC1 does not redirect HTTP requests to HTTPS when the require_ssl setting is set to true, which allows remote attackers to obtain user credentials via a man-in-the-middle attack.

CVE-2017-7505 theforeman vulnerability CVSS: 6.5 26 May 2017, 16:29 UTC

Foreman since version 1.5 is vulnerable to an incorrect authorization check due to which users with user management permission who are assigned to some organization(s) can do all operations granted by these permissions on all administrator user object outside of their scope, such as editing global admin accounts including changing their passwords.

CVE-2016-6320 theforeman vulnerability CVSS: 3.5 19 Aug 2016, 21:59 UTC

Cross-site scripting (XSS) vulnerability in app/assets/javascripts/host_edit_interfaces.js in Foreman before 1.12.2 allows remote authenticated users to inject arbitrary web script or HTML via the network interface device identifier in the host interface form.

CVE-2016-6319 theforeman vulnerability CVSS: 4.3 19 Aug 2016, 21:59 UTC

Cross-site scripting (XSS) vulnerability in app/helpers/form_helper.rb in Foreman before 1.12.2, as used by Remote Execution and possibly other plugins, allows remote attackers to inject arbitrary web script or HTML via the label parameter.

CVE-2016-5390 theforeman vulnerability CVSS: 3.5 19 Aug 2016, 21:59 UTC

Foreman before 1.11.4 and 1.12.x before 1.12.1 allow remote authenticated users with the view_hosts permission containing a filter to obtain sensitive network interface information via a request to API routes beneath "hosts," as demonstrated by a GET request to api/v2/hosts/secrethost/interfaces.

CVE-2016-4995 theforeman vulnerability CVSS: 3.5 19 Aug 2016, 21:59 UTC

Foreman before 1.11.4 and 1.12.x before 1.12.1 does not properly restrict access to preview provisioning templates, which allows remote authenticated users with permission to view some hosts to obtain sensitive host configuration information via a URL with a hostname.

CVE-2016-4475 theforeman vulnerability CVSS: 6.5 19 Aug 2016, 21:59 UTC

The (1) Organization and (2) Locations APIs and UIs in Foreman before 1.11.4 and 1.12.x before 1.12.0-RC3 allow remote authenticated users to bypass organization and location restrictions and (a) read, (b) edit, or (c) delete arbitrary organizations or locations via unspecified vectors.

CVE-2016-4451 theforeman vulnerability CVSS: 6.0 19 Aug 2016, 21:59 UTC

The (1) Organization and (2) Locations APIs in Foreman before 1.11.3 and 1.12.x before 1.12.0-RC1 allow remote authenticated users with unlimited filters to bypass organization and location restrictions and read or modify data for an arbitrary organization by leveraging knowledge of the id of that organization.

CVE-2016-3728 theforeman vulnerability CVSS: 6.8 20 May 2016, 14:59 UTC

Eval injection vulnerability in tftp_api.rb in the TFTP module in the Smart-Proxy in Foreman before 1.10.4 and 1.11.x before 1.11.2 allows remote attackers to execute arbitrary code via the PXE template type portion of the PATH_INFO to tftp/.

CVE-2016-2100 theforeman vulnerability CVSS: 6.5 20 May 2016, 14:59 UTC

Foreman before 1.10.3 and 1.11.0 before 1.11.0-RC2 allow remote authenticated users to read, modify, or delete private bookmarks by leveraging the (1) edit_bookmarks or (2) destroy_bookmarks permission.

CVE-2015-5233 theforeman vulnerability CVSS: 6.0 11 Apr 2016, 21:59 UTC

Foreman before 1.8.4 and 1.9.x before 1.9.1 do not properly apply view_hosts permissions, which allows (1) remote authenticated users with the view_reports permission to read reports from arbitrary hosts or (2) remote authenticated users with the destroy_reports permission to delete reports from arbitrary hosts via direct access to the (a) individual report show/delete pages or (b) APIs.

CVE-2015-7518 theforeman vulnerability CVSS: 4.3 17 Dec 2015, 19:59 UTC

Multiple cross-site scripting (XSS) vulnerabilities in information popups in Foreman before 1.10.0 allow remote attackers to inject arbitrary web script or HTML via (1) global parameters, (2) smart class parameters, or (3) smart variables in the (a) host or (b) hostgroup edit forms.

CVE-2015-3235 theforeman vulnerability CVSS: 6.0 14 Aug 2015, 18:59 UTC

Foreman before 1.9.0 allows remote authenticated users with the edit_users permission to edit administrator users and change their passwords via unspecified vectors.

CVE-2015-3155 theforeman vulnerability CVSS: 5.0 14 Aug 2015, 18:59 UTC

Foreman before 1.8.1 does not set the secure flag for the _session_id cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

CVE-2015-1844 theforeman vulnerability CVSS: 4.0 14 Aug 2015, 18:59 UTC

Foreman before 1.7.5 allows remote authenticated users to bypass organization and location restrictions by connecting through the REST API.

CVE-2015-1816 theforeman vulnerability CVSS: 5.0 14 Aug 2015, 18:59 UTC

Forman before 1.7.4 does not verify SSL certificates for LDAP connections, which allows man-in-the-middle attackers to spoof LDAP servers via a crafted certificate.

CVE-2014-3653 theforeman vulnerability CVSS: 4.3 06 Jul 2015, 15:59 UTC

Cross-site scripting (XSS) vulnerability in the template preview function in Foreman before 1.6.1 allows remote attackers to inject arbitrary web script or HTML via a crafted provisioning template.

CVE-2014-3691 theforeman vulnerability CVSS: 7.5 09 Mar 2015, 14:59 UTC

Smart Proxy (aka Smart-Proxy and foreman-proxy) in Foreman before 1.5.4 and 1.6.x before 1.6.2 does not validate SSL certificates, which allows remote attackers to bypass intended authentication and execute arbitrary API requests via a request without a certificate.

CVE-2014-3492 theforeman vulnerability CVSS: 4.3 01 Jul 2014, 16:55 UTC

Multiple cross-site scripting (XSS) vulnerabilities in the host YAML view in Foreman before 1.4.5 and 1.5.x before 1.5.1 allow remote attackers to inject arbitrary web script or HTML via a parameter (1) name or (2) value related to the host.

CVE-2014-3491 theforeman vulnerability CVSS: 4.3 01 Jul 2014, 16:55 UTC

Cross-site scripting (XSS) vulnerability in Foreman before 1.4.5 and 1.5.x before 1.5.1 allows remote attackers to inject arbitrary web script or HTML via the Name field to the New Host groups page, related to create, update, and destroy notification boxes.

CVE-2014-4507 theforeman vulnerability CVSS: 6.4 20 Jun 2014, 14:55 UTC

Directory traversal vulnerability in Smart-Proxy in Foreman before 1.4.5 and 1.5.x before 1.5.1 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the dst parameter to tftp/fetch_boot_file.

CVE-2014-0007 theforeman vulnerability CVSS: 7.5 20 Jun 2014, 14:55 UTC

The Smart-Proxy in Foreman before 1.4.5 and 1.5.x before 1.5.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the path parameter to tftp/fetch_boot_file.

CVE-2014-0192 theforeman vulnerability CVSS: 5.0 08 May 2014, 14:29 UTC

Foreman 1.4.0 before 1.5.0 does not properly restrict access to provisioning template previews, which allows remote attackers to obtain sensitive information via the hostname parameter, related to "spoof."

CVE-2014-0135 theforeman vulnerability CVSS: 1.9 08 May 2014, 14:29 UTC

Kafo before 0.3.17 and 0.4.x before 0.5.2, as used by Foreman, uses world-readable permissions for default_values.yaml, which allows local users to obtain passwords and other sensitive information by reading the file.

CVE-2014-0090 theforeman vulnerability CVSS: 6.8 08 May 2014, 14:29 UTC

Session fixation vulnerability in Foreman before 1.4.2 allows remote attackers to hijack web sessions via the session id cookie.

CVE-2013-0210 theforeman vulnerability CVSS: 7.5 08 May 2014, 14:29 UTC

The smart proxy Puppet run API in Foreman before 1.2.0 allows remote attackers to execute arbitrary commands via vectors related to escaping and Puppet commands.

CVE-2013-0187 theforeman vulnerability CVSS: 6.5 08 May 2014, 14:29 UTC

Foreman before 1.1 allows remote authenticated users to gain privileges via a (1) XMLHttpRequest or (2) AJAX request.

CVE-2013-0174 theforeman vulnerability CVSS: 5.0 08 May 2014, 14:29 UTC

The external node classifier (ENC) API in Foreman before 1.1 allows remote attackers to obtain the hashed root password via an API request.

CVE-2013-0173 theforeman vulnerability CVSS: 5.0 08 May 2014, 14:29 UTC

Foreman before 1.1 uses a salt of "foreman" to hash root passwords, which makes it easier for attackers to guess the password via a brute force attack.

CVE-2013-0171 theforeman vulnerability CVSS: 7.5 08 May 2014, 14:29 UTC

Foreman before 1.1 allows remote attackers to execute arbitrary code via a crafted YAML object to the (1) fact or (2) report import API.

CVE-2012-5477 theforeman vulnerability CVSS: 3.6 08 May 2014, 14:29 UTC

The smart proxy in Foreman before 1.1 uses a umask set to 0, which allows local users to modify files created by the daemon via unspecified vectors.

CVE-2013-2143 theforeman vulnerability CVSS: 6.5 17 Apr 2014, 14:55 UTC

The users controller in Katello 1.5.0-14 and earlier, and Red Hat Satellite, does not check authorization for the update_roles action, which allows remote authenticated users to gain privileges by setting a user account to an administrator account.

CVE-2012-5648 theforeman vulnerability CVSS: 7.5 04 Apr 2014, 14:55 UTC

Multiple SQL injection vulnerabilities in Foreman before 1.0.2 allow remote attackers to execute arbitrary SQL commands via unspecified parameters to (1) app/models/hostext/search.rb or (2) app/models/puppetclass.rb, related to the search mechanism.

CVE-2014-0089 theforeman vulnerability CVSS: 4.3 27 Mar 2014, 16:55 UTC

Cross-site scripting (XSS) vulnerability in app/views/common/500.html.erb in Foreman 1.4.x before 1.4.2 allows remote authenticated users to inject arbitrary web script or HTML via the bookmark name when adding a bookmark.

CVE-2013-4386 theforeman vulnerability CVSS: 7.5 20 Nov 2013, 14:12 UTC

Multiple SQL injection vulnerabilities in app/models/concerns/host_common.rb in Foreman before 1.2.3 allow remote attackers to execute arbitrary SQL commands via the (1) fqdn or (2) hostgroup parameter.

CVE-2013-4182 theforeman vulnerability CVSS: 7.5 16 Sep 2013, 19:14 UTC

app/controllers/api/v1/hosts_controller.rb in Foreman before 1.2.2 does not properly restrict access to hosts, which allows remote attackers to access arbitrary hosts via an API request.

CVE-2013-4180 theforeman vulnerability CVSS: 5.0 16 Sep 2013, 19:14 UTC

The (1) power and (2) ipmi_boot actions in the HostController in Foreman before 1.2.2 allow remote attackers to cause a denial of service (memory consumption) via unspecified input that is converted to a symbol.

CVE-2013-2121 theforeman vulnerability CVSS: 6.0 31 Jul 2013, 13:20 UTC

Eval injection vulnerability in the create method in the Bookmarks controller in Foreman before 1.2.0-RC2 allows remote authenticated users with permissions to create bookmarks to execute arbitrary code via a controller name attribute.

CVE-2013-2113 theforeman vulnerability CVSS: 6.0 31 Jul 2013, 13:20 UTC

The create method in app/controllers/users_controller.rb in Foreman before 1.2.0-RC2 allows remote authenticated users with permissions to create or edit other users to gain privileges by (1) changing the admin flag or (2) assigning an arbitrary role.

CVE-2012-3503 theforeman vulnerability CVSS: 6.5 25 Aug 2012, 10:29 UTC

The installation script in Katello 1.0 and earlier does not properly generate the Application.config.secret_token value, which causes each default installation to have the same secret token, and allows remote attackers to authenticate to the CloudForms System Engine web interface as an arbitrary user by creating a cookie using the default secret_token.