CVE-2024-7700

A command injection flaw was found in the "Host Init Config" template in the Foreman application via the "Install Packages" field on the "Register Host" page. This flaw allows an attacker with the necessary privileges to inject arbitrary commands into the configuration, potentially allowing unauthorized command execution during host registration. Although this issue requires user interaction to execute injected commands, it poses a significant risk if an unsuspecting user runs the generated registration script.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2024-7700 Third Party Advisory Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2304090 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:theforeman:foreman:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:theforeman:foreman:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*

History

16 Sep 2024, 14:20

Type Values Removed Values Added
Summary
  • (es) Se encontró una falla de inyección de comando en la plantilla "Host Init Config" en la aplicación Foreman a través del campo "Instalar paquetes" en la página "Registrar host". Esta falla permite a un atacante con los privilegios necesarios inyectar comandos arbitrarios en la configuración, lo que potencialmente permite la ejecución de comandos no autorizados durante el registro del host. Aunque este problema requiere la interacción del usuario para ejecutar comandos inyectados, plantea un riesgo significativo si un usuario desprevenido ejecuta el script de registro generado.
First Time Redhat
Theforeman foreman
Theforeman
Redhat satellite
References () https://access.redhat.com/security/cve/CVE-2024-7700 - () https://access.redhat.com/security/cve/CVE-2024-7700 - Third Party Advisory, Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2304090 - () https://bugzilla.redhat.com/show_bug.cgi?id=2304090 - Issue Tracking, Third Party Advisory
CPE cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*
cpe:2.3:a:theforeman:foreman:-:*:*:*:*:*:*:*

12 Aug 2024, 18:15

Type Values Removed Values Added
Summary (en) A command injection flaw was found in the "Host Init Config" template in the Foreman application, via the "Install Packages" field on the "Register Host" page. This issue may allow an attacker with the necessary privileges to inject arbitrary commands into the configuration, potentially allowing unauthorized command execution during host registration. Although this issue requires user interaction to execute injected commands, it poses a significant risk if an unsuspecting user runs the generated registration script. (en) A command injection flaw was found in the "Host Init Config" template in the Foreman application via the "Install Packages" field on the "Register Host" page. This flaw allows an attacker with the necessary privileges to inject arbitrary commands into the configuration, potentially allowing unauthorized command execution during host registration. Although this issue requires user interaction to execute injected commands, it poses a significant risk if an unsuspecting user runs the generated registration script.

12 Aug 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-12 17:15

Updated : 2024-09-16 14:20


NVD link : CVE-2024-7700

Mitre link : CVE-2024-7700

CVE.ORG link : CVE-2024-7700


JSON object : View

Products Affected

theforeman

  • foreman

redhat

  • satellite
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')