hammer_cli uses unverified SSL certificates by default. When hammer_cli initiates HTTPS connections using apipie-binding and rest-clients, it doesn’t verify that the SSL certificate is correct. This allows man-in-the-middle (MitM) attacks.
projects.theforeman.org/issues/19033
seclists.org/oss-sec/2017/q2/10
www.securityfocus.com/bid/97153
access.redhat.com/errata/RHSA-2018:0336
access.redhat.com/security/cve/CVE-2017-2667
bugzilla.redhat.com/show_bug.cgi?id=1436262
github.com/theforeman/hammer-cli/pull/235
projects.theforeman.org/issues/19033