Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestions search

With package: foreman

Found 10 matching suggestions

View:
Compact
Detailed
Permalink CVE-2026-1961
8.0 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 2 weeks, 5 days ago
Forman: foreman: remote code execution via command injection in websocket proxy

A flaw was found in Foreman. A remote attacker could exploit a command injection vulnerability in Foreman's WebSocket proxy implementation. This vulnerability arises from the system's use of unsanitized hostname values from compute resource providers when constructing shell commands. By operating a malicious compute resource server, an attacker could achieve remote code execution on the Foreman server when a user accesses VM VNC console functionality. This could lead to the compromise of sensitive credentials and the entire managed infrastructure.

References

Affected products

foreman
  • *
libcomps
  • *
satellite
  • *
python-brotli
  • *
python-django
  • *
python-pulp-rpm
  • *
rubygem-katello
  • *
rubygem-rubyipmi
  • *
rubygem-fog-kubevirt
  • *
python-pulp-container
  • *
rubygem-foreman_kubevirt
  • *
yggdrasil-worker-forwarder
  • *
satellite-utils:el8/foreman

Matching in nixpkgs

pkgs.foreman

Process manager for applications with multiple components

pkgs.satellite

Program for showing navigation satellite data

Package maintainers

Permalink CVE-2025-9572
5.0 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 1 month, 2 weeks ago
Foreman: satellite: graphql api permission bypass leads to information disclosure

n authorization flaw in Foreman's GraphQL API allows low-privileged users to access metadata beyond their assigned permissions. Unlike the REST API, which correctly enforces access controls, the GraphQL endpoint does not apply proper filtering, leading to an authorization bypass.

References

Affected products

foreman
  • *
  • <3.16.2
satellite
  • *
rubygem-katello
  • *

Matching in nixpkgs

pkgs.foreman

Process manager for applications with multiple components

pkgs.satellite

Program for showing navigation satellite data

pkgs.xwayland-satellite

Xwayland outside your Wayland compositor

  • nixos-unstable 0.8
    • nixpkgs-unstable 0.8
    • nixos-unstable-small 0.8
  • nixos-25.11 0.8
    • nixos-25.11-small 0.8
    • nixpkgs-25.11-darwin 0.8

Package maintainers

created 1 month, 3 weeks ago
Foreman has improper input validation which could lead to partial …

Foreman has improper input validation which could lead to partial Denial of Service

Affected products

Foreman
  • ==through 2014-03-05

Matching in nixpkgs

pkgs.foreman

Process manager for applications with multiple components

Package maintainers

created 1 month, 3 weeks ago
It was found that foreman, versions 1.x.x before 1.15.6, in …

It was found that foreman, versions 1.x.x before 1.15.6, in Satellite 6 did not properly enforce access controls on certain resources. An attacker with access to the API and knowledge of the resource name can access resources in other organizations.

Affected products

foreman
  • ==1.x.x before 1.15.6

Matching in nixpkgs

pkgs.foreman

Process manager for applications with multiple components

Package maintainers

Permalink CVE-2025-10622
8.0 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 4 months, 1 week ago
Foreman: os command injection via ct_location and fcct_location parameters

A flaw was found in Red Hat Satellite (Foreman component). This vulnerability allows an authenticated user with edit_settings permissions to achieve arbitrary command execution on the underlying operating system via insufficient server-side validation of command whitelisting.

References

Affected products

foreman
  • *
  • <3.16.1
satellite:el8/foreman

Matching in nixpkgs

pkgs.foreman

Process manager for applications with multiple components

Package maintainers

Permalink CVE-2023-4320
7.6 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
created 1 year ago
Satellite: arithmetic overflow in satellite

An arithmetic overflow flaw was found in Satellite when creating a new personal access token. This flaw allows an attacker who uses this arithmetic overflow to create personal access tokens that are valid indefinitely, resulting in damage to the system's integrity.

References

Affected products

foreman
  • *
Security
satellite
  • ==6.13

Matching in nixpkgs

pkgs.foreman

Process manager for applications with multiple components

Package maintainers

Permalink CVE-2023-4886
6.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 year ago
Foreman: world readable file containing secrets

A sensitive information exposure vulnerability was found in foreman. Contents of tomcat's server.xml file, which contain passwords to candlepin's keystore and truststore, were found to be world readable.

References

Affected products

foreman
  • ==3.8.0
  • *
foreman-installer
  • *

Matching in nixpkgs

pkgs.foreman

Process manager for applications with multiple components

Package maintainers

Permalink CVE-2025-2157
3.3 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 1 year ago
Foreman: disclosure of executed commands and outputs in foreman / red hat satellite

A flaw was found in Foreman/Red Hat Satellite. Improper file permissions allow low-privileged OS users to monitor and access temporary files under /var/tmp, exposing sensitive command outputs, such as /etc/shadow. This issue can lead to information disclosure and privilege escalation if exploited effectively.

References

Affected products

foreman
  • ==6.16
  • ==6.17

Matching in nixpkgs

pkgs.foreman

Process manager for applications with multiple components

Package maintainers

Permalink CVE-2024-7700
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 year, 3 months ago
Foreman: command injection in "host init config" template via "install packages" field on foreman

A command injection flaw was found in the "Host Init Config" template in the Foreman application via the "Install Packages" field on the "Register Host" page. This flaw allows an attacker with the necessary privileges to inject arbitrary commands into the configuration, potentially allowing unauthorized command execution during host registration. Although this issue requires user interaction to execute injected commands, it poses a significant risk if an unsuspecting user runs the generated registration script.

References

Affected products

foreman

Matching in nixpkgs

pkgs.foreman

Process manager for applications with multiple components

Package maintainers

Permalink CVE-2024-4871
6.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 1 year, 3 months ago
Foreman: host ssh key not being checked in remote execution

A vulnerability was found in Satellite. When running a remote execution job on a host, the host's SSH key is not being checked. When the key changes, the Satellite still connects it because it uses "-o StrictHostKeyChecking=no". This flaw can lead to a man-in-the-middle attack (MITM), denial of service, leaking of secrets the remote execution job contains, or other issues that may arise from the attacker's ability to forge an SSH key. This issue does not directly allow unauthorized remote execution on the Satellite, although it can leak secrets that may lead to it.

References

Affected products

foreman
  • ==3.9.1.8
  • *
candlepin
  • *
satellite
  • *
python-pulpcore
  • *
rubygem-dynflow
  • *
rubygem-katello
  • *
foreman-installer
  • *
python-pulp-container
  • *
rubygem-foreman_ansible
  • *
rubygem-foreman_remote_execution
  • *
rubygem-smart_proxy_container_gateway
  • *
rubygem-smart_proxy_remote_execution_ssh
  • *

Matching in nixpkgs

pkgs.foreman

Process manager for applications with multiple components

pkgs.satellite

Program for showing navigation satellite data

Package maintainers