| Vulnerability Name: | CVE-2018-1096 (CCN-140964) | ||||||||||||
| Assigned: | 2017-12-04 | ||||||||||||
| Published: | 2018-03-28 | ||||||||||||
| Updated: | 2019-10-09 | ||||||||||||
| Summary: | An input sanitization flaw was found in the id field in the dashboard controller of Foreman before 1.16.1. A user could use this flaw to perform an SQL injection attack on the back end database. | ||||||||||||
| CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) 6.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C)
6.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:H/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
| ||||||||||||
| Vulnerability Type: | CWE-89 | ||||||||||||
| Vulnerability Consequences: | Data Manipulation | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2018-1096 Source: CONFIRM Type: Vendor Advisory http://projects.theforeman.org/issues/23028 Source: CCN Type: oss-sec Mailing List, Wed, 28 Mar 2018 10:53:44 +0300 Foreman 1.9+ SQL injection in dashboard page Source: REDHAT Type: Third Party Advisory RHSA-2018:2927 Source: CONFIRM Type: Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1561061 Source: XF Type: UNKNOWN foreman-cve20181096-sql-injection(140964) Source: CCN Type: Foreman GIT Repository Fixes #23028 - Properly escape params passed to where. #5363 | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||