HIGH · 8.0

CVE-2023-0462

An arbitrary code execution flaw was found in Foreman. This issue may allow an admin user to execute arbitrary code on the underlying operating system by setting global parameters with a YAML payload.

Vulnerability Description

An arbitrary code execution flaw was found in Foreman. This issue may allow an admin user to execute arbitrary code on the underlying operating system by setting global parameters with a YAML payload.

CVSS Score

8.0

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
TheforemanForeman< 3.8.0
RedhatSatellite>= 6.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2023-0462?

CVE-2023-0462 is a vulnerability with a CVSS score of 8.0 (HIGH). An arbitrary code execution flaw was found in Foreman. This issue may allow an admin user to execute arbitrary code on the underlying operating system by setting global parameters with a YAML payload.

How severe is CVE-2023-0462?

CVE-2023-0462 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2023-0462?

Check the references section above for vendor advisories and patch information. Affected products include: Theforeman Foreman, Redhat Satellite.