Theforeman
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Theforeman product.
RSS Feeds for Theforeman security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Theforeman products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Theforeman Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 0 vulnerabilities in Theforeman. Theforeman did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 2 | 7.00 |
| 2023 | 4 | 8.50 |
| 2022 | 6 | 7.08 |
| 2021 | 7 | 6.23 |
| 2020 | 0 | 0.00 |
| 2019 | 7 | 5.92 |
| 2018 | 10 | 6.29 |
It may take a day or so for new Theforeman vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Theforeman Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2024-6861 | Nov 06, 2024 |
Foreman GraphQL API Sensitive Data ExposureA disclosure of sensitive information flaw was found in foreman via the GraphQL API. If the introspection feature is enabled, it is possible for attackers to retrieve sensitive admin authentication keys which could result in a compromise of the entire product's API. |
|
| CVE-2024-7700 | Aug 12, 2024 |
Command Injection in Foreman Host Init Config Template (CVE-2024-7700)A command injection flaw was found in the "Host Init Config" template in the Foreman application via the "Install Packages" field on the "Register Host" page. This flaw allows an attacker with the necessary privileges to inject arbitrary commands into the configuration, potentially allowing unauthorized command execution during host registration. Although this issue requires user interaction to execute injected commands, it poses a significant risk if an unsuspecting user runs the generated registration script. |
|
| CVE-2023-4886 | Oct 03, 2023 |
Foreman: Tomcat server.xml SINFO Exposure via World-Readable FileA sensitive information exposure vulnerability was found in foreman. Contents of tomcat's server.xml file, which contain passwords to candlepin's keystore and truststore, were found to be world readable. |
|
| CVE-2022-3874 | Sep 22, 2023 |
Foreman: Admin Auth Command Injection via CoreOS/Fedora CoreOS TemplatesA command injection flaw was found in foreman. This flaw allows an authenticated user with admin privileges on the foreman instance to transpile commands through CoreOS and Fedora CoreOS configurations in templates, possibly resulting in arbitrary command execution on the underlying operating system. |
|
| CVE-2023-0462 | Sep 20, 2023 |
Foreman A* Code Exec via YAML Global ParamsAn arbitrary code execution flaw was found in Foreman. This issue may allow an admin user to execute arbitrary code on the underlying operating system by setting global parameters with a YAML payload. |
|
| CVE-2023-0118 | Sep 20, 2023 |
Foreman: Arbitrary Code Exec via Admin Safe Mode BypassAn arbitrary code execution flaw was found in Foreman. This flaw allows an admin user to bypass safe mode in templates and execute arbitrary code on the underlying operating system. |
|
| CVE-2021-20260 | Aug 26, 2022 |
Foreman DC Plugin API leaks passwords via auth local accessA flaw was found in the Foreman project. The Datacenter plugin exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
|
| CVE-2021-3590 | Aug 22, 2022 |
Foreman API Credential Leak Exposes Azure Compute PasswordsA flaw was found in Foreman project. A credential leak was identified which will expose Azure Compute Profile password through JSON of the API output. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
|
| CVE-2020-10710 | Aug 16, 2022 |
Red Hat Satellite Plaintext Candlepin Password Disclosure via satellite-installerA flaw was found where the Plaintext Candlepin password is disclosed while updating Red Hat Satellite through the satellite-installer. This flaw allows an attacker with sufficiently high privileges, such as root, to retrieve the Candlepin plaintext password. |
|
| CVE-2021-3456 | Mar 30, 2022 |
An improper authorization handling flaw was found in ForemanAn improper authorization handling flaw was found in Foreman. The Salt plugin for the smart-proxy allows foreman clients to execute actions that should be limited to the Foreman Server. This flaw allows an authenticated local attacker to access and delete limited resources and also causes a denial of service on the Foreman server. The highest threat from this vulnerability is to integrity and system availability. |
|
| CVE-2021-20290 | Mar 25, 2022 |
An improper authorization handling flaw was found in ForemanAn improper authorization handling flaw was found in Foreman. The OpenSCAP plugin for the smart-proxy allows foreman clients to execute actions that should be limited to the Foreman Server. This flaw allows an authenticated local attacker to access and delete limited resources and also causes a denial of service on the Foreman server. The highest threat from this vulnerability is to integrity and system availability. |
|
| CVE-2021-3589 | Mar 23, 2022 |
An authorization flaw was found in Foreman AnsibleAn authorization flaw was found in Foreman Ansible. An authenticated attacker with certain permissions to create and run Ansible jobs can access hosts through job templates. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
|
| CVE-2021-3584 | Dec 23, 2021 |
A server side remote code execution vulnerability was found in Foreman projectA server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injection. The highest threat from this vulnerability is to confidentiality, integrity and availability of system. Fixed releases are 2.4.1, 2.5.1, 3.0.0. |
|
| CVE-2021-20259 | Jun 07, 2021 |
A flaw was found in the Foreman projectA flaw was found in the Foreman project. The Proxmox compute resource exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Versions before foreman_fog_proxmox 0.13.1 are affected |
|
| CVE-2021-3469 | Jun 03, 2021 |
Foreman versions before 2.3.4 and before 2.4.0 is affected by an improper authorization handling flawForeman versions before 2.3.4 and before 2.4.0 is affected by an improper authorization handling flaw. An authenticated attacker can impersonate the foreman-proxy if product enable the Puppet Certificate authority (CA) to sign certificate requests that have subject alternative names (SANs). Foreman do not enable SANs by default and `allow-authorization-extensions` is set to `false` unless user change `/etc/puppetlabs/puppetserver/conf.d/ca.conf` configuration explicitly. |
|
| CVE-2020-10716 | May 27, 2021 |
A flaw was found in Red Hat Satellite's Job Invocation, where the "User Input" entry was not properly restricted to the viewA flaw was found in Red Hat Satellite's Job Invocation, where the "User Input" entry was not properly restricted to the view. This flaw allows a malicious Satellite user to scan through the Job Invocation, with the ability to search for passwords and other sensitive data. This flaw affects tfm-rubygem-foreman_ansible versions before 4.0.3.4. |
|
| CVE-2021-3457 | May 12, 2021 |
An improper authorization handling flaw was found in ForemanAn improper authorization handling flaw was found in Foreman. The Shellhooks plugin for the smart-proxy allows Foreman clients to execute actions that should be limited to the Foreman Server. This flaw allows an authenticated local attacker to access and delete limited resources and also causes a denial of service on the Foreman server. The highest threat from this vulnerability is to integrity and system availability. |
|
| CVE-2021-3494 | Apr 26, 2021 |
A smart proxy that provides a restful API to various sub-systems of the Foreman is affected by the flawA smart proxy that provides a restful API to various sub-systems of the Foreman is affected by the flaw which can cause a Man-in-the-Middle attack. The FreeIPA module of Foreman smart proxy does not check the SSL certificate, thus, an unauthenticated attacker can perform actions in FreeIPA if certain conditions are met. The highest threat from this flaw is to system confidentiality. This flaw affects Foreman versions before 2.5.0. |
|
| CVE-2021-3413 | Apr 08, 2021 |
A flaw was found in Red Hat Satellite in tfm-rubygem-foreman_azure_rm in versions before 2.2.0A flaw was found in Red Hat Satellite in tfm-rubygem-foreman_azure_rm in versions before 2.2.0. A credential leak was identified which will expose Azure Resource Manager's secret key through JSON of the API output. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
|
| CVE-2014-0091 | Dec 11, 2019 |
Foreman has improper input validationForeman has improper input validation which could lead to partial Denial of Service |
|
| CVE-2013-2101 | Dec 03, 2019 |
Katello has multiple XSS issues in various entitiesKatello has multiple XSS issues in various entities |
|
| CVE-2019-14825 | Nov 25, 2019 |
A cleartext password storage issue was discovered in Katello, versions 3.x.x.x before katello 3.12.0.9A cleartext password storage issue was discovered in Katello, versions 3.x.x.x before katello 3.12.0.9. Registry credentials used during container image discovery were inadvertently logged without being masked. This flaw could expose the registry credentials to other privileged users. |
|
| CVE-2014-8183 | Aug 01, 2019 |
It was found that foreman, versions 1.x.x before 1.15.6, in Satellite 6 did not properly enforce access controls on certain resourcesIt was found that foreman, versions 1.x.x before 1.15.6, in Satellite 6 did not properly enforce access controls on certain resources. An attacker with access to the API and knowledge of the resource name can access resources in other organizations. |
|
| CVE-2019-10198 | Jul 31, 2019 |
An authentication bypass vulnerability was discovered in foreman-tasks before 0.15.7An authentication bypass vulnerability was discovered in foreman-tasks before 0.15.7. Previously, commit tasks were searched through find_resource, which performed authorization checks. After the change to Foreman, an unauthenticated user can view the details of a task through the web UI or API, if they can discover or guess the UUID of the task. |
|
| CVE-2019-3893 | Apr 09, 2019 |
In Foreman it was discoveredIn Foreman it was discovered that the delete compute resource operation, when executed from the Foreman API, leads to the disclosure of the plaintext password or token for the affected compute resource. A malicious user with the "delete_compute_resource" permission can use this flaw to take control over compute resources managed by foreman. Versions before 1.20.3, 1.21.1, 1.22.0 are vulnerable. |
|
| CVE-2018-16887 | Jan 13, 2019 |
A cross-site scripting (XSS) flaw was found in the katello component of SatelliteA cross-site scripting (XSS) flaw was found in the katello component of Satellite. An attacker with privilege to create/edit organizations and locations is able to execute a XSS attacks against other users through the Subscriptions or the Red Hat Repositories wizards. This can possibly lead to malicious code execution and extraction of the anti-CSRF token of higher privileged users. Versions before 3.9.0 are vulnerable. |
|
| CVE-2018-14623 | Dec 14, 2018 |
A SQL injection flaw was found in katello's errata-related APIA SQL injection flaw was found in katello's errata-related API. An authenticated remote attacker can craft input data to force a malformed SQL query to the backend database, which will leak internal IDs. This is issue is related to an incomplete fix for CVE-2016-3072. Version 3.10 and older is vulnerable. |
|
| CVE-2018-16861 | Dec 07, 2018 |
A cross-site scripting (XSS) flaw was found in the foreman component of satelliteA cross-site scripting (XSS) flaw was found in the foreman component of satellite. An attacker with privilege to create entries using the Hosts, Monitor, Infrastructure, or Administer Menus is able to execute a XSS attacks against other users, possibly leading to malicious code execution and extraction of the anti-CSRF token of higher privileged users. Foreman before 1.18.3, 1.19.1, and 1.20.0 are vulnerable. |
|
| CVE-2018-14664 | Oct 12, 2018 |
A flaw was found in foreman from versions 1.18A flaw was found in foreman from versions 1.18. A stored cross-site scripting vulnerability exists due to an improperly escaped HTML code in the breadcrumbs bar. This allows a user with permissions to edit which attribute is used in the breadcrumbs bar to store code that will be executed on the client side. |
|
| CVE-2018-14643 | Sep 21, 2018 |
An authentication bypass flaw was found in the smart_proxy_dynflow component used by ForemanAn authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulnerable Foreman instances, in a highly privileged context. |
|
| CVE-2017-2662 | Aug 22, 2018 |
A flaw was found in Foreman's katello plugin version 3.4.5A flaw was found in Foreman's katello plugin version 3.4.5. After setting a new role to allow restricted access on a repository with a filter (filter set on the Product Name), the filter is not respected when the actions are done via hammer using the repository id. |
|
| CVE-2016-8634 | Aug 01, 2018 |
A vulnerability was found in foreman 1.14.0A vulnerability was found in foreman 1.14.0. When creating an organization or location in Foreman, if the name contains HTML then the second step of the wizard (/organizations/id/step2) will render the HTML. This occurs in the alertbox on the page. The result is a stored XSS attack if an organization/location with HTML in the name is created, then a user is linked directly to this URL. |
|
| CVE-2016-8613 | Jul 31, 2018 |
A flaw was found in foreman 1.5.1A flaw was found in foreman 1.5.1. The remote execution plugin runs commands on hosts over SSH from the Foreman web UI. When a job is submitted that contains HTML tags, the console output shown in the web UI does not escape the output causing any HTML or JavaScript to run in the user's browser. The output of the job is stored, making this a stored XSS vulnerability. |
|
| CVE-2018-1096 | Apr 05, 2018 |
An input sanitization flaw was found in the id field in the dashboard controller of Foreman before 1.16.1An input sanitization flaw was found in the id field in the dashboard controller of Foreman before 1.16.1. A user could use this flaw to perform an SQL injection attack on the back end database. |
|
| CVE-2018-1097 | Apr 04, 2018 |
A flaw was found in foreman before 1.16.1A flaw was found in foreman before 1.16.1. The issue allows users with limited permissions for powering oVirt/RHV hosts on and off to discover the username and password used to connect to the compute resource. |
|
| CVE-2017-2667 | Mar 12, 2018 |
Hammer CLI, a CLI utility for Foreman, before version 0.10.0, did not explicitly set the verify_ssl flag for apipie-bindingsHammer CLI, a CLI utility for Foreman, before version 0.10.0, did not explicitly set the verify_ssl flag for apipie-bindings that disable it by default. As a result the server certificates are not checked and connections are prone to man-in-the-middle attacks. |
|
| CVE-2017-15100 | Nov 27, 2017 |
An attacker submitting facts to the Foreman server containing HTML can cause a stored XSS on certain pages: (1) Facts page, when clicking on the "chart" button and hovering over the chart; (2) Trends page, when checking the graph for a trend based on a such fact; (3) Statistics page, for factsAn attacker submitting facts to the Foreman server containing HTML can cause a stored XSS on certain pages: (1) Facts page, when clicking on the "chart" button and hovering over the chart; (2) Trends page, when checking the graph for a trend based on a such fact; (3) Statistics page, for facts that are aggregated on this page. |
|
| CVE-2014-3531 | Oct 18, 2017 |
Multiple cross-site scripting (XSS) vulnerabilities in Foreman before 1.5.2Multiple cross-site scripting (XSS) vulnerabilities in Foreman before 1.5.2 allow remote authenticated users to inject arbitrary web script or HTML via the operating system (1) name or (2) description. |
|
| CVE-2014-0208 | Oct 16, 2017 |
Cross-site scripting (XSS) vulnerability in the search auto-completion functionality in Foreman before 1.4.4Cross-site scripting (XSS) vulnerability in the search auto-completion functionality in Foreman before 1.4.4 allows remote authenticated users to inject arbitrary web script or HTML via a crafted key name. |
|
| CVE-2015-5152 | Jul 17, 2017 |
Foreman after 1.1 and before 1.9.0-RC1 does not redirect HTTP requests to HTTPS when the require_ssl setting is set to true, whichForeman after 1.1 and before 1.9.0-RC1 does not redirect HTTP requests to HTTPS when the require_ssl setting is set to true, which allows remote attackers to obtain user credentials via a man-in-the-middle attack. |
|
| CVE-2016-4475 | Aug 19, 2016 |
The (1) Organization and (2) Locations APIs and UIs in Foreman before 1.11.4 and 1.12.x before 1.12.0-RC3The (1) Organization and (2) Locations APIs and UIs in Foreman before 1.11.4 and 1.12.x before 1.12.0-RC3 allow remote authenticated users to bypass organization and location restrictions and (a) read, (b) edit, or (c) delete arbitrary organizations or locations via unspecified vectors. |
|
| CVE-2016-4451 | Aug 19, 2016 |
The (1) Organization and (2) Locations APIs in Foreman before 1.11.3 and 1.12.x before 1.12.0-RC1 allow remote authenticated users with unlimited filters to bypass organization and location restrictions and read or modify data for an arbitrary organization by leveraging knowledge of the id ofThe (1) Organization and (2) Locations APIs in Foreman before 1.11.3 and 1.12.x before 1.12.0-RC1 allow remote authenticated users with unlimited filters to bypass organization and location restrictions and read or modify data for an arbitrary organization by leveraging knowledge of the id of that organization. |
|
| CVE-2016-6320 | Aug 19, 2016 |
Cross-site scripting (XSS) vulnerability in app/assets/javascripts/host_edit_interfaces.js in Foreman before 1.12.2Cross-site scripting (XSS) vulnerability in app/assets/javascripts/host_edit_interfaces.js in Foreman before 1.12.2 allows remote authenticated users to inject arbitrary web script or HTML via the network interface device identifier in the host interface form. |
|
| CVE-2016-6319 | Aug 19, 2016 |
Cross-site scripting (XSS) vulnerability in app/helpers/form_helper.rb in Foreman before 1.12.2, as used by Remote Execution and possibly other pluginsCross-site scripting (XSS) vulnerability in app/helpers/form_helper.rb in Foreman before 1.12.2, as used by Remote Execution and possibly other plugins, allows remote attackers to inject arbitrary web script or HTML via the label parameter. |
|
| CVE-2016-4995 | Aug 19, 2016 |
Foreman before 1.11.4 and 1.12.x before 1.12.1 does not properly restrict access to preview provisioning templates, whichForeman before 1.11.4 and 1.12.x before 1.12.1 does not properly restrict access to preview provisioning templates, which allows remote authenticated users with permission to view some hosts to obtain sensitive host configuration information via a URL with a hostname. |
|
| CVE-2016-2100 | May 20, 2016 |
Foreman before 1.10.3 and 1.11.0 before 1.11.0-RC2Foreman before 1.10.3 and 1.11.0 before 1.11.0-RC2 allow remote authenticated users to read, modify, or delete private bookmarks by leveraging the (1) edit_bookmarks or (2) destroy_bookmarks permission. |
|
| CVE-2016-3728 | May 20, 2016 |
Eval injection vulnerability in tftp_api.rb in the TFTP module in the Smart-Proxy in Foreman before 1.10.4 and 1.11.x before 1.11.2Eval injection vulnerability in tftp_api.rb in the TFTP module in the Smart-Proxy in Foreman before 1.10.4 and 1.11.x before 1.11.2 allows remote attackers to execute arbitrary code via the PXE template type portion of the PATH_INFO to tftp/. |
|
| CVE-2015-5233 | Apr 11, 2016 |
Foreman before 1.8.4 and 1.9.x before 1.9.1 do not properly apply view_hosts permissions, whichForeman before 1.8.4 and 1.9.x before 1.9.1 do not properly apply view_hosts permissions, which allows (1) remote authenticated users with the view_reports permission to read reports from arbitrary hosts or (2) remote authenticated users with the destroy_reports permission to delete reports from arbitrary hosts via direct access to the (a) individual report show/delete pages or (b) APIs. |
|
| CVE-2015-7518 | Dec 17, 2015 |
Multiple cross-site scripting (XSS) vulnerabilities in information popups in Foreman before 1.10.0Multiple cross-site scripting (XSS) vulnerabilities in information popups in Foreman before 1.10.0 allow remote attackers to inject arbitrary web script or HTML via (1) global parameters, (2) smart class parameters, or (3) smart variables in the (a) host or (b) hostgroup edit forms. |
|
| CVE-2015-3155 | Aug 14, 2015 |
Foreman before 1.8.1 does not set the secure flag for the _session_id cookie in an https sessionForeman before 1.8.1 does not set the secure flag for the _session_id cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. |
|