Red Hat Cloudforms
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Red Hat Cloudforms.
By the Year
In 2025 there have been 0 vulnerabilities in Red Hat Cloudforms. Cloudforms did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2025 | 0 | 0.00 |
2024 | 0 | 0.00 |
2023 | 0 | 0.00 |
2022 | 0 | 0.00 |
2021 | 1 | 8.10 |
2020 | 5 | 6.50 |
2019 | 8 | 6.41 |
2018 | 14 | 7.85 |
It may take a day or so for new Cloudforms vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Red Hat Cloudforms Security Vulnerabilities
A flaw was found in Cloudforms
CVE-2020-25716
8.1 - High
- June 07, 2021
A flaw was found in Cloudforms. A role-based privileges escalation flaw where export or import of administrator files is possible. An attacker with a specific group can perform actions restricted only to system administrator. This is the affect of an incomplete fix for CVE-2020-10783. The highest threat from this vulnerability is to data confidentiality and integrity. Versions before cfme 5.11.10.1 are affected
This release fixes a Cross Site Request Forgery vulnerability was found in Red Hat CloudForms
CVE-2020-14369
6.3 - Medium
- December 02, 2020
This release fixes a Cross Site Request Forgery vulnerability was found in Red Hat CloudForms which forces end users to execute unwanted actions on a web application in which the user is currently authenticated. An attacker can make a forgery HTTP request to the server by crafting custom flash file which can force the user to perform state changing requests like provisioning VMs, running ansible playbooks and so forth.
Session Riding
Red Hat CloudForms 4.7 and 5 is affected by a role-based privilege escalation flaw
CVE-2020-10783
8.3 - High
- August 11, 2020
Red Hat CloudForms 4.7 and 5 is affected by a role-based privilege escalation flaw. An attacker with EVM-Operator group can perform actions restricted only to EVM-Super-administrator group, leads to, exporting or importing administrator files.
AuthZ
Red Hat CloudForms 4.7 and 5 leads to insecure direct object references (IDOR) and functional level access control bypass due to missing privilege check
CVE-2020-10779
6.5 - Medium
- August 11, 2020
Red Hat CloudForms 4.7 and 5 leads to insecure direct object references (IDOR) and functional level access control bypass due to missing privilege check. Therefore, if an attacker knows the right criteria, it is possible to access some sensitive data within the CloudForms.
AuthZ
In Red Hat CloudForms 4.7 and 5, the read only widgets can be edited by inspecting the forms and dropping the disabled attribute
CVE-2020-10778
6 - Medium
- August 11, 2020
In Red Hat CloudForms 4.7 and 5, the read only widgets can be edited by inspecting the forms and dropping the disabled attribute from the fields since there is no server-side validation. This business logic flaw violate the expected behavior.
AuthZ
A cross-site scripting flaw was found in Report Menu feature of Red Hat CloudForms 4.7 and 5
CVE-2020-10777
5.4 - Medium
- August 11, 2020
A cross-site scripting flaw was found in Report Menu feature of Red Hat CloudForms 4.7 and 5. An attacker could use this flaw to execute a stored XSS attack on an application administrator using CloudForms.
XSS
CFME: CSRF protection vulnerability
CVE-2014-0197
8.8 - High
- December 13, 2019
CFME: CSRF protection vulnerability via permissive check of the referrer header
Session Riding
CloudForms stores user passwords in recoverable format
CVE-2013-4423
5.5 - Medium
- November 04, 2019
CloudForms stores user passwords in recoverable format
Insufficiently Protected Credentials
Multiple cross-site scripting (XSS) vulnerabilities in ManageIQ EVM
CVE-2013-0186
6.1 - Medium
- November 01, 2019
Multiple cross-site scripting (XSS) vulnerabilities in ManageIQ EVM allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
XSS
In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes
CVE-2019-16892
5.5 - Medium
- September 25, 2019
In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption).
cfme-gemset versions 5.10.4.3 and below
CVE-2019-10159
4.3 - Medium
- June 14, 2019
cfme-gemset versions 5.10.4.3 and below, 5.9.9.3 and below are vulnerable to a data leak, due to an improper authorization in the migration log controller. An attacker with access to an unprivileged user can access all VM migration logs available.
AuthZ
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {},
CVE-2019-11358
6.1 - Medium
- April 20, 2019
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
Prototype Pollution
There is a possible denial of service vulnerability in Action View (Rails) <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 where specially crafted accept headers
CVE-2019-5419
7.5 - High
- March 27, 2019
There is a possible denial of service vulnerability in Action View (Rails) <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 where specially crafted accept headers can cause action view to consume 100% cpu and make the server unresponsive.
Resource Exhaustion
There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 where specially crafted accept headers
CVE-2019-5418
7.5 - High
- March 27, 2019
There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed.
Information Disclosure
A Broken Access Control vulnerability in Active Job versions >= 4.2.0 allows an attacker to craft user input which can cause Active Job to deserialize it using GlobalId and give them access to information
CVE-2018-16476
7.5 - High
- November 30, 2018
A Broken Access Control vulnerability in Active Job versions >= 4.2.0 allows an attacker to craft user input which can cause Active Job to deserialize it using GlobalId and give them access to information that they should not have. This vulnerability has been fixed in versions 4.2.11, 5.0.7.1, 5.1.6.1, and 5.2.1.1.
Marshaling, Unmarshaling
A code injection flaw was found in the way capacity and utilization imported control files are processed
CVE-2016-5402
8.8 - High
- October 31, 2018
A code injection flaw was found in the way capacity and utilization imported control files are processed. A remote, authenticated attacker with access to the capacity and utilization feature could use this flaw to execute arbitrary code as the user CFME runs as.
Code Injection
It was found that CloudForms does not verify that the server hostname matches the domain name in the certificate when using a custom CA and communicating with Red Hat Virtualization (RHEV) and OpenShift
CVE-2017-2639
7.5 - High
- July 27, 2018
It was found that CloudForms does not verify that the server hostname matches the domain name in the certificate when using a custom CA and communicating with Red Hat Virtualization (RHEV) and OpenShift. This would allow an attacker to spoof RHEV or OpenShift systems and potentially harvest sensitive information from CloudForms.
Improper Certificate Validation
CloudForms Management Engine (cfme) is vulnerable to an improper security setting in the dRuby component of CloudForms
CVE-2018-10905
7.8 - High
- July 24, 2018
CloudForms Management Engine (cfme) is vulnerable to an improper security setting in the dRuby component of CloudForms. An attacker with access to an unprivileged local shell could use this flaw to execute commands as a high privileged user.
Shell injection
Ansible 2.5 prior to 2.5.5, and 2.4 prior to 2.4.5, do not honor the no_log task flag for failed tasks
CVE-2018-10855
5.9 - Medium
- July 03, 2018
Ansible 2.5 prior to 2.5.5, and 2.4 prior to 2.4.5, do not honor the no_log task flag for failed tasks. When the no_log flag has been used to protect sensitive data passed to a task from being logged, and that task does not run successfully, Ansible will expose sensitive data in log files and on the terminal of the user running Ansible.
Insertion of Sensitive Information into Log File
There is an information leak vulnerability in Sprockets
CVE-2018-3760
7.5 - High
- June 26, 2018
There is an information leak vulnerability in Sprockets. Versions Affected: 4.0.0.beta7 and lower, 3.7.1 and lower, 2.12.4 and lower. Specially crafted requests can be used to access files that exists on the filesystem that is outside an application's root directory, when the Sprockets server is used in production. All users running an affected release should either upgrade or use one of the work arounds immediately.
Information Disclosure
rubyzip gem rubyzip version 1.2.1 and earlier contains a Directory Traversal vulnerability in Zip::File component
CVE-2018-1000544
9.8 - Critical
- June 26, 2018
rubyzip gem rubyzip version 1.2.1 and earlier contains a Directory Traversal vulnerability in Zip::File component that can result in write arbitrary files to the filesystem. This attack appear to be exploitable via If a site allows uploading of .zip files , an attacker can upload a malicious file that contains symlinks or files with absolute pathnames "../" to write arbitrary files to the filesystem..
insecure temporary file
Sinatra before 2.0.2 has XSS via the 400 Bad Request page
CVE-2018-11627
6.1 - Medium
- May 31, 2018
Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs upon a params parser exception.
XSS
Ansible Tower through version 3.2.3 has a vulnerability
CVE-2018-1104
8.8 - High
- May 02, 2018
Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.
Code Injection
Ansible Tower before version 3.2.4 has a flaw in the management of system and organization administrators
CVE-2018-1101
7.2 - High
- May 02, 2018
Ansible Tower before version 3.2.4 has a flaw in the management of system and organization administrators that allows for privilege escalation. System administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.
Weak Password Requirements
transport.py in the SSH server implementation of Paramiko before 1.17.6
CVE-2018-7750
9.8 - Critical
- March 13, 2018
transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.
authentification
A flaw was found in the way Postgresql allowed a user to modify the behavior of a query for other users
CVE-2018-1058
8.8 - High
- March 02, 2018
A flaw was found in the way Postgresql allowed a user to modify the behavior of a query for other users. An attacker with a user account could use this flaw to execute code with the permissions of superuser in the database. Versions 9.3 through 10 are affected.
A flaw was found in the CloudForms account configuration when using VMware
CVE-2017-12191
7.4 - High
- February 28, 2018
A flaw was found in the CloudForms account configuration when using VMware. By default, a shared account is used that has privileged access to VMRC (VMWare Remote Console) functions that may not be appropriate for users of CloudForms (and thus this account). An attacker could use this vulnerability to view and make changes to settings in the VMRC and virtual machines controlled by it that they should not have access to.
Authorization
In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask
CVE-2018-1053
7 - High
- February 09, 2018
In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file.
Incorrect Permission Assignment for Critical Resource
The x_button method in the ServiceController (vmdb/app/controllers/service_controller.rb) in Red Hat CloudForms 3.0 Management Engine 5.2
CVE-2014-0057
- March 18, 2014
The x_button method in the ServiceController (vmdb/app/controllers/service_controller.rb) in Red Hat CloudForms 3.0 Management Engine 5.2 allows remote attackers to execute arbitrary methods via unspecified vectors.
Code Injection
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Red Hat Cloudforms 3 0 Management Engine or by Red Hat? Click the Watch button to subscribe.
