Project

General

Profile

Actions

Bug #23028

closed

CVE-2018-1096: SQL injection in dashboard controller

Added by Tomer Brisker about 6 years ago. Updated almost 6 years ago.

Status:
Closed
Priority:
High
Assignee:
Category:
Security
Target version:
Fixed in Releases:
Found in Releases:

Description

Widget id is not properly escaped for save_positions action on the dashboard, leading to SQL injection possibility.
This only allows injecting conditions to the select conditions, as it is a prepared query it does not allow executing additional commands.
It is only available to authenticated users.

This issue was reported by Martin Povolný from Red Hat.


Related issues 1 (0 open1 closed)

Related to Foreman - Refactor #8106: Save dashboard widgets in DB to increase flexibilityClosedTomer Brisker10/26/2014Actions
Actions #1

Updated by Tomer Brisker about 6 years ago

  • Description updated (diff)
Actions #2

Updated by Tomer Brisker about 6 years ago

  • Related to Refactor #8106: Save dashboard widgets in DB to increase flexibility added
Actions #3

Updated by Tomer Brisker about 6 years ago

  • Subject changed from SQL injection in dashboard controller to CVE-2018-1096: SQL injection in dashboard controller
  • Private changed from Yes to No
Actions #4

Updated by The Foreman Bot about 6 years ago

  • Status changed from New to Ready For Testing
  • Pull request https://github.com/theforeman/foreman/pull/5363 added
Actions #5

Updated by Tomer Brisker about 6 years ago

  • translation missing: en.field_release set to 332
Actions #6

Updated by The Foreman Bot about 6 years ago

  • Pull request https://github.com/theforeman/foreman/pull/5364 added
Actions #7

Updated by The Foreman Bot about 6 years ago

  • Pull request https://github.com/theforeman/foreman/pull/5365 added
Actions #8

Updated by Martin Povolny about 6 years ago

  • Status changed from Ready For Testing to Closed
  • % Done changed from 0 to 100
Actions

Also available in: Atom PDF