A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injection. The highest threat from this vulnerability is to confidentiality, integrity and availability of system. Fixed releases are 2.4.1, 2.5.1, 3.0.0.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-26892 | A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injection. The highest threat from this vulnerability is to confidentiality, integrity and availability of system. Fixed releases are 2.4.1, 2.5.1, 3.0.0. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 10 Apr 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat satellite Utils
|
|
| CPEs | cpe:/a:redhat:satellite_utils:6.11::el7 cpe:/a:redhat:satellite_utils:6.11::el8 |
|
| Vendors & Products |
Redhat satellite Utils
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T17:01:07.414Z
Reserved: 2021-06-07T00:00:00
Link: CVE-2021-3584
No data.
Status : Modified
Published: 2021-12-23T20:15:11.533
Modified: 2024-11-21T06:21:54.377
Link: CVE-2021-3584
OpenCVE Enrichment
No data.
EUVD