CVE-2019-3893
Summary
| CVE | CVE-2019-3893 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-04-09 16:29:00 UTC |
| Updated | 2022-11-30 22:00:00 UTC |
| Description | In Foreman it was discovered that the delete compute resource operation, when executed from the Foreman API, leads to the disclosure of the plaintext password or token for the affected compute resource. A malicious user with the "delete_compute_resource" permission can use this flaw to take control over compute resources managed by foreman. Versions before 1.20.3, 1.21.1, 1.22.0 are vulnerable. |
Risk And Classification
Problem Types: CWE-732
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Redhat | Satellite | 6.0 | All | All | All |
| Application | Redhat | Satellite | 6.0 | All | All | All |
| Application | Theforeman | Foreman | All | All | All | All |
| Application | Theforeman | Foreman | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Fixes #26450 - add destroy rabl for compute resource by shiramax · Pull Request #6621 · theforeman/foreman · GitHub | MISC | github.com | Third Party Advisory |
| Bug #26450: CVE-2019-3893: Compute resource delete via api returns password in plaintext - Foreman | MISC | projects.theforeman.org | Vendor Advisory |
| Foreman CVE-2019-3893 Information Disclosure Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| 1696400 – (CVE-2019-3893) CVE-2019-3893 foreman: Recover of plaintext password or token for the compute resources | CONFIRM | bugzilla.redhat.com | Issue Tracking, Third Party Advisory |
| oss-security - CVE-2019-3893: Foreman: Compute resource credentials exposed during deletion on API | MLIST | www.openwall.com | Mailing List, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.