Show filters
75 Total Results
Displaying 21-30 of 75
Sort by:
Attacker Value
Unknown

CVE-2018-16861

Disclosure Date: December 07, 2018 (last updated November 27, 2024)
A cross-site scripting (XSS) flaw was found in the foreman component of satellite. An attacker with privilege to create entries using the Hosts, Monitor, Infrastructure, or Administer Menus is able to execute a XSS attacks against other users, possibly leading to malicious code execution and extraction of the anti-CSRF token of higher privileged users. Foreman before 1.18.3, 1.19.1, and 1.20.0 are vulnerable.
0
Attacker Value
Unknown

CVE-2018-14664

Disclosure Date: October 12, 2018 (last updated November 27, 2024)
A flaw was found in foreman from versions 1.18. A stored cross-site scripting vulnerability exists due to an improperly escaped HTML code in the breadcrumbs bar. This allows a user with permissions to edit which attribute is used in the breadcrumbs bar to store code that will be executed on the client side.
0
Attacker Value
Unknown

CVE-2018-14643

Disclosure Date: September 21, 2018 (last updated November 27, 2024)
An authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulnerable Foreman instances, in a highly privileged context.
0
Attacker Value
Unknown

CVE-2016-7077

Disclosure Date: September 10, 2018 (last updated November 08, 2023)
foreman before 1.14.0 is vulnerable to an information leak. It was found that Foreman form helper does not authorize options for associated objects. Unauthorized user can see names of such objects if their count is less than 6.
0
Attacker Value
Unknown

CVE-2016-7078

Disclosure Date: September 10, 2018 (last updated November 08, 2023)
foreman before version 1.15.0 is vulnerable to an information leak through organizations and locations feature. When a user is assigned _no_ organizations/locations, they are able to view all resources instead of none (mirroring an administrator's view). The user's actions are still limited by their assigned permissions, e.g. to control viewing, editing and deletion.
0
Attacker Value
Unknown

CVE-2016-8639

Disclosure Date: August 01, 2018 (last updated November 08, 2023)
It was found that foreman before 1.13.0 is vulnerable to a stored XSS via an organization or location name. This could allow an attacker with privileges to set the organization or location name to display arbitrary HTML including scripting code within the web interface.
0
Attacker Value
Unknown

CVE-2016-8634

Disclosure Date: August 01, 2018 (last updated November 27, 2024)
A vulnerability was found in foreman 1.14.0. When creating an organization or location in Foreman, if the name contains HTML then the second step of the wizard (/organizations/id/step2) will render the HTML. This occurs in the alertbox on the page. The result is a stored XSS attack if an organization/location with HTML in the name is created, then a user is linked directly to this URL.
0
Attacker Value
Unknown

CVE-2016-8613

Disclosure Date: July 31, 2018 (last updated November 27, 2024)
A flaw was found in foreman 1.5.1. The remote execution plugin runs commands on hosts over SSH from the Foreman web UI. When a job is submitted that contains HTML tags, the console output shown in the web UI does not escape the output causing any HTML or JavaScript to run in the user's browser. The output of the job is stored, making this a stored XSS vulnerability.
0
Attacker Value
Unknown

CVE-2017-7535

Disclosure Date: July 26, 2018 (last updated November 27, 2024)
foreman before version 1.16.0 is vulnerable to a stored XSS in organizations/locations assignment to hosts. Exploiting this requires a user to actively assign hosts to an organization that contains html in its name which is visible to the user prior to taking action.
0
Attacker Value
Unknown

CVE-2017-2672

Disclosure Date: June 21, 2018 (last updated November 26, 2024)
A flaw was found in foreman before version 1.15 in the logging of adding and registering images. An attacker with access to the foreman log file would be able to view passwords for provisioned systems in the log file, allowing them to access those systems.
0