A flaw was found in foreman before version 1.15 in the logging of adding and registering images. An attacker with access to the foreman log file would be able to view passwords for provisioned systems in the log file, allowing them to access those systems.
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
https://projects.theforeman.org/issues/19169 | exploit vendor advisory |
https://access.redhat.com/errata/RHSA-2018:0336 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/97526 | vdb entry third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2672 | issue tracking exploit third party advisory |