Red Hat CloudForms 4.1

CPE Details

Red Hat CloudForms 4.1
4.1
2016-08-30
15h32 +00:00
2016-08-30
15h32 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:redhat:cloudforms:4.1:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

cloudforms

Version

4.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2020-25716 2021-06-07 18h27 +00:00 A flaw was found in Cloudforms. A role-based privileges escalation flaw where export or import of administrator files is possible. An attacker with a specific group can perform actions restricted only to system administrator. This is the affect of an incomplete fix for CVE-2020-10783. The highest threat from this vulnerability is to data confidentiality and integrity. Versions before cfme 5.11.10.1 are affected
8.1
High
CVE-2020-14369 2020-12-02 13h28 +00:00 This release fixes a Cross Site Request Forgery vulnerability was found in Red Hat CloudForms which forces end users to execute unwanted actions on a web application in which the user is currently authenticated. An attacker can make a forgery HTTP request to the server by crafting custom flash file which can force the user to perform state changing requests like provisioning VMs, running ansible playbooks and so forth.
6.3
Medium
CVE-2020-14325 2020-08-11 10h49 +00:00 Red Hat CloudForms before 5.11.7.0 was vulnerable to the User Impersonation authorization flaw which allows malicious attacker to create existent and non-existent role-based access control user, with groups and roles. With a selected group of EvmGroup-super_administrator, an attacker can perform any API request as a super administrator.
9.1
Critical
CVE-2016-5402 2018-10-31 12h00 +00:00 A code injection flaw was found in the way capacity and utilization imported control files are processed. A remote, authenticated attacker with access to the capacity and utilization feature could use this flaw to execute arbitrary code as the user CFME runs as.
8.8
High
CVE-2016-7071 2018-09-10 13h00 +00:00 It was found that the CloudForms before 5.6.2.2, and 5.7.0.7 did not properly apply permissions controls to VM IDs passed by users. A remote, authenticated attacker could use this flaw to execute arbitrary VMs on systems managed by CloudForms if they know the ID of the VM.
8.8
High
CVE-2016-5383 2016-08-26 12h00 +00:00 The web UI in Red Hat CloudForms 4.1 allows remote authenticated users to execute arbitrary code via vectors involving "Lack of field filters."
8.8
High