Total vulnerabilities in the database
Red Hat CloudForms before 5.11.7.0 was vulnerable to the User Impersonation authorization flaw which allows malicious attacker to create existent and non-existent role-based access control user, with groups and roles. With a selected group of EvmGroup-super_administrator, an attacker can perform any API request as a super administrator.
Software | From | Fixed in |
---|---|---|
redhat / cloudforms | - | 5.11.7.0 |