Red Hat CloudForms Multiple Insecure File Permissions and Security Bypass Vulnerabilities

Red Hat CloudForms is prone to multiple insecure file-permission vulnerabilities and a security-bypass vulnerability.

An attacker can exploit these issues to obtain sensitive information such as administrative password, access and modify the files with arbitrary data, bypass certain security restrictions, and perform unauthorized actions. This may aid in further attacks.


 

Privacy Statement
Copyright 2010, SecurityFocus