CVE-2021-3584

Source
https://cve.org/CVERecord?id=CVE-2021-3584
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3584.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-3584
Downstream
Published
2021-12-23T20:15:11.533Z
Modified
2026-03-14T14:49:38.141646Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injection. The highest threat from this vulnerability is to confidentiality, integrity and availability of system. Fixed releases are 2.4.1, 2.5.1, 3.0.0.

References

Affected packages

Git / github.com/theforeman/smart-proxy

Affected ranges

Type
GIT
Repo
https://github.com/theforeman/smart-proxy
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Introduced
Fixed
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "2.4.1"
        },
        {
            "introduced": "2.5.0"
        },
        {
            "fixed": "2.5.1"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "3.0.0-rc1"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "3.0.0-rc2"
        }
    ]
}

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3584.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "6.0"
            }
        ]
    }
]