An arbitrary code execution flaw was found in Foreman. This flaw allows an admin user to bypass safe mode in templates and execute arbitrary code on the underlying operating system.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2023:4466 | Release Notes Third Party Advisory |
https://access.redhat.com/errata/RHSA-2023:5979 | |
https://access.redhat.com/errata/RHSA-2023:5980 | |
https://access.redhat.com/errata/RHSA-2023:6818 | |
https://access.redhat.com/security/cve/CVE-2023-0118 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2159291 | Issue Tracking Third Party Advisory |
https://access.redhat.com/errata/RHSA-2023:4466 | Release Notes Third Party Advisory |
https://access.redhat.com/errata/RHSA-2023:5979 | |
https://access.redhat.com/errata/RHSA-2023:5980 | |
https://access.redhat.com/errata/RHSA-2023:6818 | |
https://access.redhat.com/security/cve/CVE-2023-0118 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2159291 | Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 07:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2023:4466 - Release Notes, Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:5979 - | |
References | () https://access.redhat.com/errata/RHSA-2023:5980 - | |
References | () https://access.redhat.com/errata/RHSA-2023:6818 - | |
References | () https://access.redhat.com/security/cve/CVE-2023-0118 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2159291 - Issue Tracking, Third Party Advisory |
03 May 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Sep 2023, 23:10
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:satellite:*:*:*:*:*:*:*:* |
|
First Time |
Theforeman
Theforeman foreman Redhat enterprise Linux Redhat Redhat satellite |
|
CWE | CWE-78 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
References | (MISC) https://access.redhat.com/security/cve/CVE-2023-0118 - Third Party Advisory | |
References | (MISC) https://access.redhat.com/errata/RHSA-2023:4466 - Release Notes, Third Party Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2159291 - Issue Tracking, Third Party Advisory |
20 Sep 2023, 14:25
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-20 14:15
Updated : 2024-11-21 07:36
NVD link : CVE-2023-0118
Mitre link : CVE-2023-0118
CVE.ORG link : CVE-2023-0118
JSON object : View
Products Affected
redhat
- satellite
- enterprise_linux
theforeman
- foreman
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')