Description
The Smart-Proxy in Foreman before 1.4.5 and 1.5.x before 1.5.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the path parameter to tftp/fetch_boot_file.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Lukas Zapletal · textremotemultiple
https://www.exploit-db.com/exploits/39222
References (2)
Core 2
Core References
Vendor Advisory vendor-advisory
x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2014-0770.html
Patch x_refsource_confirm
http://projects.theforeman.org/issues/6086
Scores
EPSS
0.0640
EPSS Percentile
91.1%
Details
Status
published
Products (6)
theforeman/foreman
1.4.0
theforeman/foreman
1.4.1
theforeman/foreman
1.4.2
theforeman/foreman
1.4.3
theforeman/foreman
1.5.0
theforeman/foreman
< 1.4.4
Published
Jun 20, 2014
Tracked Since
Feb 18, 2026