CVE-2014-3691
Severity CVSS v4.0:
Pending analysis
Type:
CWE-310
Cryptographic Issues
Publication date:
09/03/2015
Last modified:
12/04/2025
Description
Smart Proxy (aka Smart-Proxy and foreman-proxy) in Foreman before 1.5.4 and 1.6.x before 1.6.2 does not validate SSL certificates, which allows remote attackers to bypass intended authentication and execute arbitrary API requests via a request without a certificate.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:redhat:openstack:4.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:* | 1.5.3 (including) | |
cpe:2.3:a:theforeman:foreman:1.6.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:theforeman:foreman:1.6.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://projects.theforeman.org/issues/7822
- http://rhn.redhat.com/errata/RHSA-2015-0287.html
- http://rhn.redhat.com/errata/RHSA-2015-0288.html
- https://github.com/theforeman/smart-proxy/pull/217
- https://groups.google.com/forum/#%21topic/foreman-announce/jXC5ixybjqo
- http://projects.theforeman.org/issues/7822
- http://rhn.redhat.com/errata/RHSA-2015-0287.html
- http://rhn.redhat.com/errata/RHSA-2015-0288.html
- https://github.com/theforeman/smart-proxy/pull/217
- https://groups.google.com/forum/#%21topic/foreman-announce/jXC5ixybjqo