Vulnerability CVE-2014-0140


Published: 2014-10-06

Description:
Red Hat CloudForms 3.1 Management Engine (CFME) before 5.3 allows remote authenticated users to access sensitive controllers and actions via a direct HTTP or HTTPS request.

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

Vendor: Redhat
Product: Cloudforms 3.0.5 management engine 
Version: 5.2.5;
Product: Cloudforms 3.0.4 management engine 
Version: 5.2.4;
Product: Cloudforms 3.0.3 management engine 
Version: 5.2.3;
Product: Cloudforms 3.0.2 management engine 
Version: 5.2.2;
Product: Cloudforms 3.0.1 management engine 
Version: 5.2.1;
Product: Cloudforms 3.0 management engine 
Version: 5.2;

CVSS2 => (AV:N/AC:L/Au:S/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4/10
2.9/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None

 References:
https://bugzilla.redhat.com/show_bug.cgi?id=1077359
http://rhn.redhat.com/errata/RHSA-2014-1317.html

Related CVE
CVE-2014-8167
vdsm and vdsclient does not validate certficate hostname from another vdsm which could facilitate a man-in-the-middle attack
CVE-2014-3655
JBoss KeyCloak is vulnerable to soft token deletion via CSRF
CVE-2014-3592
OpenShift Origin: Improperly validated team names could allow stored XSS attacks
CVE-2010-3857
JBoss BRMS before 5.1.0 has a XSS vulnerability via asset=UUID parameter.
CVE-2014-3599
HornetQ REST is vulnerable to XML External Entity due to insecure configuration of RestEasy
CVE-2011-2897
gdk-pixbuf through 2.31.1 has GIF loader buffer overflow when initializing decompression tables due to an input validation flaw
CVE-2019-14860
It was found that the Syndesis configuration for Cross-Origin Resource Sharing was set to allow all origins. An attacker could use this lack of protection to conduct phishing attacks and further access unauthorized information.
CVE-2019-14824
A flaw was found in the 'deref' plugin of 389-ds-base where it could use the 'search' permission to display attribute values. In some configurations, this could allow an authenticated attacker to view private attributes, such as password hashes.

Copyright 2019, cxsecurity.com

 

Back to Top