Sha256: 0b702b77dd298e041d8a322f3dc16ff691d1d59a4540d98db759f19116b0a521
Contents?: true
Size: 570 Bytes
Versions: 1
Compression:
Stored size: 570 Bytes
Contents
--- gem: smart_proxy_dynflow cve: 2018-14643 url: https://github.com/theforeman/smart_proxy_dynflow/pull/54 date: 2018-09-14 title: smart_proxy_dynflow gem authentication bypass in Foreman remote execution feature description: | An authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulnerable Foreman instances, in a highly privileged context. cvss_v3: 9.8 cvss_v2: 10.0 patched_versions: - ~> 0.1.11 - ">= 0.2.1"
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.7.0.1 | data/ruby-advisory-db/gems/smart_proxy_dynflow/CVE-2018-14643.yml |