CVE-2016-3728Improper Access Control in Foreman

Severity
8.8HIGHNVD
EPSS
2.0%
top 16.29%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 20
Latest updateMay 14

Description

Eval injection vulnerability in tftp_api.rb in the TFTP module in the Smart-Proxy in Foreman before 1.10.4 and 1.11.x before 1.11.2 allows remote attackers to execute arbitrary code via the PXE template type portion of the PATH_INFO to tftp/.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages1 packages

NVDtheforeman/foreman1.10.3, 1.11.0, 1.11.1+2

🔴Vulnerability Details

2
GHSA
GHSA-p492-9h7w-9x72: Eval injection vulnerability in tftp_api2022-05-14
CVEList
CVE-2016-3728: Eval injection vulnerability in tftp_api2016-05-20

📋Vendor Advisories

1
Red Hat
foreman: Missing input validation in Smart Proxy allows RCE via TFTP file variant parameter2016-05-05

💬Community

3
Bugzilla
CVE-2016-3728 foreman: Missing input validation in Smart Proxy allows RCE via TFTP file variant parameter2016-05-05
Bugzilla
CVE-2016-3728 foreman: Missing input validation in Smart Proxy allows RCE via TFTP file variant parameter2016-05-05
Bugzilla
CVE-2016-3728 foreman: Missing input validation in Smart Proxy allows RCE via TFTP file variant parameter2016-05-05
CVE-2016-3728 — Improper Access Control in Foreman | cvebase