Improper Authorization Affecting smart_proxy_shellhooks package, versions <0.9.2


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.04% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-RUBY-SMARTPROXYSHELLHOOKS-1292148
  • published 13 May 2021
  • disclosed 13 May 2021
  • credit Unknown

How to fix?

Upgrade smart_proxy_shellhooks to version 0.9.2 or higher.

Overview

smart_proxy_shellhooks is a Provides easy integration with 3rd parties for Foreman

Affected versions of this package are vulnerable to Improper Authorization. The Shellhooks plugin for the smart-proxy allows Foreman clients to execute actions that should be limited to the Foreman Server. This flaw allows an authenticated local attacker to access and delete limited resources and also causes a denial of service on the Foreman server. The highest threat from this vulnerability is to integrity and system availability.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
6.7 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    High
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    Low
Expand this section

NVD

6.1 medium
Expand this section

Red Hat

6.1 medium