{
  "threat_severity" : "Moderate",
  "public_date" : "2024-10-31T14:29:39Z",
  "bugzilla" : {
    "description" : "foreman: Read-only access to entire DB from templates",
    "id" : "2312524",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2312524"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-200",
  "details" : [ "A vulnerability was found in Foreman's loader macros introduced with report templates. These macros may allow an authenticated user with permissions to view and create templates to read any field from Foreman's database. By using specific strings in the loader macros, users can bypass permissions and access sensitive information.", "A vulnerability was found in Foreman's loader macros introduced with report templates. These macros may allow an authenticated user with permissions to view and create templates to read any field from Foreman's database. By using specific strings in the loader macros, users can bypass permissions and access sensitive information." ],
  "statement" : "This issue is classified as moderate rather than important due to the requirement of authenticated access and specific permissions. While it allows exploitation of loader macros to access unintended fields in Foreman's database, the vulnerability is only accessible to users with permission to view or create templates containing these macros. As a result, the exploit's potential impact is limited to users who already possess a significant level of access within the system. Furthermore, the issue does not lead to privilege escalation, code execution, or direct system compromise, but rather unauthorized data access.",
  "affected_release" : [ {
    "product_name" : "Red Hat Satellite 6.13 for RHEL 8",
    "release_date" : "2024-10-31T00:00:00Z",
    "advisory" : "RHSA-2024:8717",
    "cpe" : "cpe:/a:redhat:satellite_utils:6.13::el8",
    "package" : "foreman-0:3.5.1.25-1.el8sat"
  }, {
    "product_name" : "Red Hat Satellite 6.14 for RHEL 8",
    "release_date" : "2024-10-31T00:00:00Z",
    "advisory" : "RHSA-2024:8718",
    "cpe" : "cpe:/a:redhat:satellite_utils:6.14::el8",
    "package" : "foreman-0:3.7.0.14-1.el8sat"
  }, {
    "product_name" : "Red Hat Satellite 6.15 for RHEL 8",
    "release_date" : "2024-10-31T00:00:00Z",
    "advisory" : "RHSA-2024:8719",
    "cpe" : "cpe:/a:redhat:satellite_utils:6.15::el8",
    "package" : "foreman-0:3.9.1.11-1.el8sat"
  }, {
    "product_name" : "Red Hat Satellite 6.16 for RHEL 8",
    "release_date" : "2024-11-05T00:00:00Z",
    "advisory" : "RHSA-2024:8906",
    "cpe" : "cpe:/a:redhat:satellite_utils:6.16::el8",
    "package" : "foreman-0:3.12.0.1-1.el8sat"
  }, {
    "product_name" : "Red Hat Satellite 6.16 for RHEL 9",
    "release_date" : "2024-11-05T00:00:00Z",
    "advisory" : "RHSA-2024:8906",
    "cpe" : "cpe:/a:redhat:satellite_utils:6.16::el9",
    "package" : "foreman-0:3.12.0.1-1.el9sat"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-8553\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-8553" ],
  "name" : "CVE-2024-8553",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}