Public Date:
1696400: CVE-2019-3893 foreman: Recover of plaintext password or token for the compute resources
It was discovered that the delete compute resource operation, when executed from the Foreman API, leads to the disclosure of the plaintext password or token for the affected compute resource. A malicious user with the "delete_compute_resource" permission can use this flaw to take control over compute resources managed by foreman.

Find out more about CVE-2019-3893 from the MITRE CVE dictionary dictionary and NIST NVD.


Red Hat Satellite 6:
This vulnerability is currently targeted to be addressed in an upcoming release.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 4.9
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required High
User Interaction None
Scope Unchanged
Confidentiality High
Integrity Impact None
Availability Impact None

Affected Packages State

Platform Package State
Red Hat Satellite 6 foreman Affected
Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.


This issue was discovered by Vatsal Parekh (Red Hat).


Do not grant the "destroy_compute_resource" permission to users that should not know the password.

Last Modified