Type/Severity
Security Advisory: Critical
Topic
An update is now available for CloudForms Management Engine 5.10.
Description
A high severity vulnerability was found in all active versions of Red Hat CloudForms before 5.11.7.0. The out of band OS command injection vulnerability can be exploited by authenticated attacker while setuping conversion host through Infrastructure Migration Solution. This flaw allows attacker to execute arbitrary commands on CloudForms server.
Security Fix(es):
- cfme: CloudForms: Out-of-band OS Command Injection through conversion host (CVE-2020-14324)
- cfme-appliance: CloudForms: User Impersonation in the API for OIDC and SAML (CVE-2020-14325)
- cfme-gemset: CloudForms: Business logic bypass through widgets (CVE-2020-10778)
- cfme-gemset: CloudForms: Missing access control leads to escalation of admin group privileges (CVE-2020-10783)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
Affected Products
- Red Hat CloudForms 4.7 x86_64
Fixes
- BZ – 1811145 – When using advanced search by field custom attributes the ui remains unresponsive after presenting results
- BZ – 1847628 – CVE-2020-10778 CloudForms: Business logic bypass through widgets
- BZ – 1847811 – CVE-2020-10783 CloudForms: Missing access control leads to escalation of admin group privileges
- BZ – 1855713 – CVE-2020-14324 CloudForms: Out-of-band OS Command Injection through conversion host
- BZ – 1855739 – CVE-2020-14325 CloudForms: User Impersonation in the API for OIDC and SAML
Everything is very open with a precise explanation of the issues.
It was really informative. Your site is useful. Many thanks for sharing!