The (1) shell_exec function in lib/util/MiqSshUtilV1.rb and (2) temp_cmd_file function in lib/util/MiqSshUtilV2.rb in Red Hat CloudForms 3.0 Management Engine (CFME) before 5.2.4.2 allow local users to execute arbitrary commands via a symlink attack on a temporary file with a predictable name.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Cloudforms_3.0_management_engine | Redhat | * | 5.2.4 (including) |
Cloudforms_3.0_management_engine | Redhat | 5.2 (including) | 5.2 (including) |
Cloudforms_3.0_management_engine | Redhat | 5.2.1 (including) | 5.2.1 (including) |
Cloudforms_3.0_management_engine | Redhat | 5.2.1.6 (including) | 5.2.1.6 (including) |
Cloudforms_3.0_management_engine | Redhat | 5.2.2 (including) | 5.2.2 (including) |
Cloudforms_3.0_management_engine | Redhat | 5.2.3 (including) | 5.2.3 (including) |
Cloudforms_3.0_management_engine | Redhat | 5.2.3.2 (including) | 5.2.3.2 (including) |
CloudForms Management Engine 5.x | RedHat | cfme-0:5.2.4.2-1.el6cf | * |
CloudForms Management Engine 5.x | RedHat | ruby193-rubygem-actionpack-1:3.2.13-8.el6cf | * |