CVE-2016-3728 — Improper Access Control in Foreman
Severity
8.8HIGHNVD
EPSS
2.0%
top 16.29%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 20
Latest updateMay 14
Description
Eval injection vulnerability in tftp_api.rb in the TFTP module in the Smart-Proxy in Foreman before 1.10.4 and 1.11.x before 1.11.2 allows remote attackers to execute arbitrary code via the PXE template type portion of the PATH_INFO to tftp/.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages1 packages
🔴Vulnerability Details
2📋Vendor Advisories
1Red Hat▶
foreman: Missing input validation in Smart Proxy allows RCE via TFTP file variant parameter↗2016-05-05
💬Community
3Bugzilla▶
CVE-2016-3728 foreman: Missing input validation in Smart Proxy allows RCE via TFTP file variant parameter↗2016-05-05
Bugzilla▶
CVE-2016-3728 foreman: Missing input validation in Smart Proxy allows RCE via TFTP file variant parameter↗2016-05-05
Bugzilla▶
CVE-2016-3728 foreman: Missing input validation in Smart Proxy allows RCE via TFTP file variant parameter↗2016-05-05