Skip to content

Exposure of Sensitive Information to an Unauthorized Actor in foreman_fog_proxmox

High severity GitHub Reviewed Published Jun 10, 2021 to the GitHub Advisory Database • Updated Jan 24, 2023

Package

bundler foreman_fog_proxmox (RubyGems)

Affected versions

< 0.13.1

Patched versions

0.13.1

Description

A flaw was found in the Foreman project. The Proxmox compute resource exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Versions of foreman_fog_proxmox prior to 0.13.1 are affected.

References

Published by the National Vulnerability Database Jun 7, 2021
Reviewed Jun 10, 2021
Published to the GitHub Advisory Database Jun 10, 2021
Last updated Jan 24, 2023

Severity

High
7.8
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Weaknesses

CVE ID

CVE-2021-20259

GHSA ID

GHSA-f2rp-4rv7-fc95
Checking history
See something to contribute? Suggest improvements for this vulnerability.