| Vulnerability Name: | CVE-2016-7078 (CCN-151678) | ||||||||||||
| Assigned: | 2016-08-23 | ||||||||||||
| Published: | 2018-09-10 | ||||||||||||
| Updated: | 2019-10-09 | ||||||||||||
| Summary: | foreman before version 1.15.0 is vulnerable to an information leak through organizations and locations feature. When a user is assigned _no_ organizations/locations, they are able to view all resources instead of none (mirroring an administrator's view). The user's actions are still limited by their assigned permissions, e.g. to control viewing, editing and deletion. | ||||||||||||
| CVSS v3 Severity: | 4.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) 3.8 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
| ||||||||||||
| Vulnerability Type: | CWE-200 | ||||||||||||
| Vulnerability Consequences: | Obtain Information | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2016-7078 Source: BID Type: Third Party Advisory, VDB Entry 96385 Source: CCN Type: Red Hat Bugzilla Bug 1386244 (CVE-2016-7078) CVE-2016-7078 foreman: Information leak through organizations and locations feature Source: CONFIRM Type: Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7078 Source: XF Type: UNKNOWN foreman-cve20167078-info-disc(151678) Source: CONFIRM Type: Third Party Advisory https://github.com/theforeman/foreman/commit/5f606e11cf39719bf62f8b1f3396861b32387905 Source: CONFIRM Type: Vendor Advisory https://projects.theforeman.org/issues/16982 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20170222 CVE-2016-7078: Foreman organization/location authorization vulnerability Source: CONFIRM Type: Vendor Advisory https://theforeman.org/security.html#2016-7078 Source: CCN Type: Foreman Web site Foreman | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||