Lucene search

K
redhatcveRedhat.comRH:CVE-2021-20290
HistoryMar 30, 2021 - 10:27 a.m.

CVE-2021-20290

2021-03-3010:27:02
redhat.com
access.redhat.com
34
cve-2021-20290
foreman
openscap plugin
smart-proxy
authentication
local attacker
system availability
integrity
mitigation
disable
foreman-proxy
settings
denial of service

CVSS2

3.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:P/A:P

CVSS3

6.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H

EPSS

0

Percentile

5.1%

An improper authorization handling flaw was found in Foreman. The OpenSCAP plugin for the smart-proxy allows foreman clients to execute actions that should be limited to the Foreman Server. This flaw allows an authenticated local attacker to access and delete limited resources and also causes a denial of service on the Foreman server. The highest threat from this vulnerability is to integrity and system availability.

Mitigation

To mitigate the flaw, disable smart_proxy_openscap plugin from the Server. You can do that either by editing /etc/foreman-proxy/settings.d/openscap.yml and restarting systemctl restart foreman-proxy.service, or by running foreman-installer --no-enable-foreman-proxy-plugin-openscap command.

CVSS2

3.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:P/A:P

CVSS3

6.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H

EPSS

0

Percentile

5.1%

Related for RH:CVE-2021-20290