Vulnerabilities (CVE)

Vendor filter

Redhat Subscribe

Product filter

Cloudforms Subscribe

Filter

35 total CVE
CVE Vendors Products Updated CVSS
CVE-2017-7530 1 Redhat 2 Cloudforms, Cloudforms Management Engine 2018-10-01 6.5
In CloudForms Management Engine (cfme) before 5.7.3 and 5.8.x before 5.8.1, it was found that privilege check is missing when invoking arbitrary methods via filtering on VMs that MiqExpression will execute that is triggerable by API users. An...
CVE-2017-2653 1 Redhat 2 Cloudforms, Cloudforms Management Engine 2018-09-27 4.0
A number of unused delete routes are present in CloudForms before 5.7.2.1 which can be accessed via GET requests instead of just POST requests. This could allow an attacker to bypass the protect_from_forgery XSRF protection causing the routes to...
CVE-2017-2632 1 Redhat 2 Cloudforms, Cloudforms Management Engine 2018-09-27 4.0
A logic error in valid_role() in CloudForms role validation before 5.7.1.3 could allow a tenant administrator to create groups with a higher privilege level than the tenant administrator should have. This would allow an attacker with tenant...
CVE-2017-2664 1 Redhat 2 Cloudforms, Cloudforms Management Engine 2018-09-21 4.0
CloudForms Management Engine (cfme) before 5.7.3 and 5.8.x before 5.8.1 lacks RBAC controls on certain methods in the rails application portion of CloudForms. An attacker with access could use a variety of methods within the rails application...
CVE-2012-5604 1 Redhat 1 Cloudforms 2018-05-12 4.3
The ldap_fluff gem for Ruby, as used in Red Hat CloudForms 1.1, when using Active Directory for authentication, allows remote attackers to bypass authentication via unspecified vectors.
CVE-2017-12191 1 Redhat 1 Cloudforms 2018-03-27 7.5
A flaw was found in the CloudForms account configuration when using VMware. By default, a shared account is used that has privileged access to VMRC (VMWare Remote Console) functions that may not be appropriate for users of CloudForms (and thus...
CVE-2012-5605 1 Redhat 1 Cloudforms 2017-08-29 2.1
Grinder in Red Hat CloudForms before 1.1 uses world-writable permissions for /var/lib/pulp/cache/grinder/, which allows local users to modify grinder cache files.
CVE-2012-5603 1 Redhat 1 Cloudforms 2017-08-29 5.5
proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users' settings via unspecified vectors related to...
CVE-2012-4574 1 Redhat 1 Cloudforms 2017-08-29 2.1
Pulp in Red Hat CloudForms before 1.1 uses world-readable permissions for pulp.conf, which allows local users to read the administrative password by reading this file.
CVE-2012-3538 1 Redhat 1 Cloudforms 2017-08-29 3.3
Pulp in Red Hat CloudForms before 1.1 logs administrative passwords in a world-readable file, which allows local users to read pulp administrative passwords by reading production.log.
CVE-2016-4471 1 Redhat 1 Cloudforms 2017-06-15 6.5
ManageIQ in CloudForms before 4.1 allows remote authenticated users to execute arbitrary code.
CVE-2016-5383 1 Redhat 1 Cloudforms 2016-08-26 6.5
The web UI in Red Hat CloudForms 4.1 allows remote authenticated users to execute arbitrary code via vectors involving "Lack of field filters."
CVE-2015-7502 1 Redhat 2 Cloudforms Management Engine, Cloudforms 2016-04-18 1.9
Red Hat CloudForms 3.2 Management Engine (CFME) 5.4.4 and CloudForms 4.0 Management Engine (CFME) 5.5.0 do not properly encrypt data in the backend PostgreSQL database, which might allow local users to obtain sensitive data and consequently gain...
CVE-2014-0057 1 Redhat 2 Cloudforms 3.0 Management Engine, Cloudforms 2014-03-19 7.5
The x_button method in the ServiceController (vmdb/app/controllers/service_controller.rb) in Red Hat CloudForms 3.0 Management Engine 5.2 allows remote attackers to execute arbitrary methods via unspecified vectors.
CVE-2013-6443 1 Redhat 2 Cloudforms 3.0 Management Engine, Cloudforms 2014-01-23 6.8
CloudForms 3.0 Management Engine before 5.2.1.6 allows remote attackers to bypass the Ruby on Rails protect_from_forgery mechanism and conduct cross-site request forgery (CSRF) attacks via a destructive action in a request.