Total vulnerabilities in the database
It was found that the CloudForms before 5.6.2.2, and 5.7.0.7 did not properly apply permissions controls to VM IDs passed by users. A remote, authenticated attacker could use this flaw to execute arbitrary VMs on systems managed by CloudForms if they know the ID of the VM.
Software | From | Fixed in |
---|---|---|
redhat / cloudforms_management_engine | 5.7.0.0 | 5.7.0.7 |
redhat / cloudforms_management_engine | - | 5.6.2.2 |
redhat / cloudforms | 4.1 | 4.1.x |