Lucene search

K
rubygemsRubySecRUBY:FOREMAN_FOG_PROXMOX-2021-20259
HistoryJun 09, 2021 - 9:00 p.m.

Exposure of Sensitive Information to an Unauthorized Actor in foreman_fog_proxmox

2021-06-0921:00:00
RubySec
github.com
11
foreman project
proxmox compute resource
api
authenticated attacker
data confidentiality
data integrity
system availability
vulnerability
software
foreman_fog_proxmox

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

A flaw was found in the Foreman project. The Proxmox compute resource
exposes the password through the API to an authenticated local attacker with view_hosts
permission. The highest threat from this vulnerability is to data confidentiality
and integrity as well as system availability. Versions before foreman_fog_proxmox
0.13.1 are affected

Affected configurations

Vulners
Node
rubyforeman_fog_proxmoxRange0.13.1
VendorProductVersionCPE
rubyforeman_fog_proxmox*cpe:2.3:a:ruby:foreman_fog_proxmox:*:*:*:*:*:*:*:*

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Related for RUBY:FOREMAN_FOG_PROXMOX-2021-20259