Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-11610 (GCVE-0-2017-11610)
Vulnerability from cvelistv5
- n/a
 
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T18:12:40.456Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2017:3005",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:3005"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt"
          },
          {
            "name": "FEDORA-2017-307eab89e1",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B/"
          },
          {
            "name": "FEDORA-2017-85eb9f7a36",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt"
          },
          {
            "name": "FEDORA-2017-713430fb15",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/"
          },
          {
            "name": "DSA-3942",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3942"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/Supervisor/supervisor/issues/964"
          },
          {
            "name": "42779",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/42779/"
          },
          {
            "name": "GLSA-201709-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201709-06"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-07-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-01T21:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "RHSA-2017:3005",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:3005"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt"
        },
        {
          "name": "FEDORA-2017-307eab89e1",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B/"
        },
        {
          "name": "FEDORA-2017-85eb9f7a36",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt"
        },
        {
          "name": "FEDORA-2017-713430fb15",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/"
        },
        {
          "name": "DSA-3942",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3942"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/Supervisor/supervisor/issues/964"
        },
        {
          "name": "42779",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/42779/"
        },
        {
          "name": "GLSA-201709-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201709-06"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-11610",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2017:3005",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:3005"
            },
            {
              "name": "https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt",
              "refsource": "CONFIRM",
              "url": "https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt"
            },
            {
              "name": "https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt",
              "refsource": "CONFIRM",
              "url": "https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt"
            },
            {
              "name": "https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt",
              "refsource": "CONFIRM",
              "url": "https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt"
            },
            {
              "name": "FEDORA-2017-307eab89e1",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B/"
            },
            {
              "name": "FEDORA-2017-85eb9f7a36",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/"
            },
            {
              "name": "https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt",
              "refsource": "CONFIRM",
              "url": "https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt"
            },
            {
              "name": "FEDORA-2017-713430fb15",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/"
            },
            {
              "name": "DSA-3942",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3942"
            },
            {
              "name": "https://github.com/Supervisor/supervisor/issues/964",
              "refsource": "CONFIRM",
              "url": "https://github.com/Supervisor/supervisor/issues/964"
            },
            {
              "name": "42779",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/42779/"
            },
            {
              "name": "GLSA-201709-06",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201709-06"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-11610",
    "datePublished": "2017-08-23T14:00:00",
    "dateReserved": "2017-07-24T00:00:00",
    "dateUpdated": "2024-08-05T18:12:40.456Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2017-11610\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-08-23T14:29:00.237\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups.\"},{\"lang\":\"es\",\"value\":\"El servidor XML-RPC en supervisor en versiones anteriores a la 3.0.1, 3.1.x en versiones anteriores a la 3.1.4, 3.2.x en versiones anteriores a la 3.2.4, y 3.3.x en versiones anteriores a la 3.3.3 permite que atacantes remotos autenticados ejecuten comandos arbitrarios mediante una petici\u00f3n XML-RPC, relacionada con b\u00fasquedas de espacio de nombres supervisor anidados.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:C/I:C/A:C\",\"baseScore\":9.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-276\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:supervisord:supervisor:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.0\",\"matchCriteriaId\":\"EF8843B0-023D-4D38-B8A6-0082DA076EB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:supervisord:supervisor:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F7331EA-43A4-4B66-A2C8-9F9677CDF199\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:supervisord:supervisor:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"873339F6-2F2F-4FCA-850B-AFBB869FAE49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:supervisord:supervisor:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB8C540A-EFA9-41E3-B80A-B5D1DC002BF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:supervisord:supervisor:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F9FCD82-05D1-4AE0-B5F4-83C70D34B3C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:supervisord:supervisor:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEBADED9-ABB4-4D28-916E-71A005781756\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:supervisord:supervisor:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58A70602-4024-4EB4-BC9D-9AA65E3DC3FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:supervisord:supervisor:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"164F8D14-DC0E-4F60-B3E9-E4BB7BC859DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:supervisord:supervisor:3.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FACD9C65-805C-42B8-970F-71086029EC3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:supervisord:supervisor:3.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73D1DFCA-8289-41C7-A11A-5B5BFA6BA493\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:supervisord:supervisor:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9C1E9BA-5D9E-407F-80DE-E3C7886F8FD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:supervisord:supervisor:3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4642C276-6F33-4FC8-80FB-512310366D30\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C729D5D1-ED95-443A-9F53-5D7C2FD9B80C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"772E9557-A371-4664-AE2D-4135AAEB89AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E4D8269-B407-4C24-AAB0-02F885C7D752\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:cloudforms:4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32E1BA91-4695-4E64-A9D7-4A6CB6904D41\"}]}]}],\"references\":[{\"url\":\"http://www.debian.org/security/2017/dsa-3942\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3005\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/Supervisor/supervisor/issues/964\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/201709-06\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/42779/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.debian.org/security/2017/dsa-3942\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3005\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/Supervisor/supervisor/issues/964\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201709-06\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/42779/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]}]}}"
  }
}
  RHSA-2017:3005
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for CloudForms Management Engine 5.8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.\n\nThe following packages have been upgraded to a later upstream version: ansible-tower (3.1.5), cfme (5.8.2.3), cfme-appliance (5.8.2.3), cfme-gemset (5.8.2.3), rabbitmq-server (3.6.9), rh-ruby23-rubygem-nokogiri (1.8.1), supervisor (3.1.4). (BZ#1476286, BZ#1485484)\n\nSecurity Fix(es):\n\n* A flaw was found in Tower\u0027s interface with SCM repositories. If a Tower project (SCM repository) definition does not have the \u0027delete before update\u0027 flag set, an attacker with commit access to the upstream playbook source repository could create a Trojan playbook that, when executed by Tower, modifies the checked out SCM repository to add git hooks. These git hooks could, in turn, cause arbitrary command and code execution as the user Tower runs as. (CVE-2017-12148)\n\n* A vulnerability was found in the XML-RPC interface in supervisord. When processing malformed commands, an attacker can cause arbitrary shell commands to be executed on the server as the same user as supervisord. Exploitation requires the attacker to first be authenticated to the supervisord service. (CVE-2017-11610)\n\nThe CVE-2017-12148 issue was discovered by Ryan Petrello (Red Hat).\n\nAdditional Changes:\n\nThis update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3005",
        "url": "https://access.redhat.com/errata/RHSA-2017:3005"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_cloudforms/4.5/html/release_notes/index#red_hat_cloudforms_4_5_2",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_cloudforms/4.5/html/release_notes/index#red_hat_cloudforms_4_5_2"
      },
      {
        "category": "external",
        "summary": "1439650",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1439650"
      },
      {
        "category": "external",
        "summary": "1459987",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459987"
      },
      {
        "category": "external",
        "summary": "1459996",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459996"
      },
      {
        "category": "external",
        "summary": "1460754",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1460754"
      },
      {
        "category": "external",
        "summary": "1461061",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461061"
      },
      {
        "category": "external",
        "summary": "1465087",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1465087"
      },
      {
        "category": "external",
        "summary": "1465089",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1465089"
      },
      {
        "category": "external",
        "summary": "1471709",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471709"
      },
      {
        "category": "external",
        "summary": "1476143",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1476143"
      },
      {
        "category": "external",
        "summary": "1477194",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477194"
      },
      {
        "category": "external",
        "summary": "1477616",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477616"
      },
      {
        "category": "external",
        "summary": "1477701",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477701"
      },
      {
        "category": "external",
        "summary": "1477702",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477702"
      },
      {
        "category": "external",
        "summary": "1478367",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478367"
      },
      {
        "category": "external",
        "summary": "1478372",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478372"
      },
      {
        "category": "external",
        "summary": "1478379",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478379"
      },
      {
        "category": "external",
        "summary": "1478391",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478391"
      },
      {
        "category": "external",
        "summary": "1478398",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478398"
      },
      {
        "category": "external",
        "summary": "1478400",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478400"
      },
      {
        "category": "external",
        "summary": "1478406",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478406"
      },
      {
        "category": "external",
        "summary": "1478407",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478407"
      },
      {
        "category": "external",
        "summary": "1478409",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478409"
      },
      {
        "category": "external",
        "summary": "1478415",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478415"
      },
      {
        "category": "external",
        "summary": "1478418",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478418"
      },
      {
        "category": "external",
        "summary": "1478421",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478421"
      },
      {
        "category": "external",
        "summary": "1478428",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478428"
      },
      {
        "category": "external",
        "summary": "1478429",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478429"
      },
      {
        "category": "external",
        "summary": "1478434",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478434"
      },
      {
        "category": "external",
        "summary": "1478435",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478435"
      },
      {
        "category": "external",
        "summary": "1478436",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478436"
      },
      {
        "category": "external",
        "summary": "1478506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478506"
      },
      {
        "category": "external",
        "summary": "1478508",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478508"
      },
      {
        "category": "external",
        "summary": "1478510",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478510"
      },
      {
        "category": "external",
        "summary": "1478513",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478513"
      },
      {
        "category": "external",
        "summary": "1478515",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478515"
      },
      {
        "category": "external",
        "summary": "1478523",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478523"
      },
      {
        "category": "external",
        "summary": "1478526",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478526"
      },
      {
        "category": "external",
        "summary": "1478527",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478527"
      },
      {
        "category": "external",
        "summary": "1478529",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478529"
      },
      {
        "category": "external",
        "summary": "1478532",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478532"
      },
      {
        "category": "external",
        "summary": "1478535",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478535"
      },
      {
        "category": "external",
        "summary": "1478542",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478542"
      },
      {
        "category": "external",
        "summary": "1478544",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478544"
      },
      {
        "category": "external",
        "summary": "1478554",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478554"
      },
      {
        "category": "external",
        "summary": "1478557",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478557"
      },
      {
        "category": "external",
        "summary": "1478558",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478558"
      },
      {
        "category": "external",
        "summary": "1478560",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478560"
      },
      {
        "category": "external",
        "summary": "1478562",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478562"
      },
      {
        "category": "external",
        "summary": "1478563",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478563"
      },
      {
        "category": "external",
        "summary": "1478565",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478565"
      },
      {
        "category": "external",
        "summary": "1478568",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478568"
      },
      {
        "category": "external",
        "summary": "1478571",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478571"
      },
      {
        "category": "external",
        "summary": "1479367",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479367"
      },
      {
        "category": "external",
        "summary": "1479405",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479405"
      },
      {
        "category": "external",
        "summary": "1479407",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479407"
      },
      {
        "category": "external",
        "summary": "1479409",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479409"
      },
      {
        "category": "external",
        "summary": "1479414",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479414"
      },
      {
        "category": "external",
        "summary": "1479423",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479423"
      },
      {
        "category": "external",
        "summary": "1479437",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479437"
      },
      {
        "category": "external",
        "summary": "1479453",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479453"
      },
      {
        "category": "external",
        "summary": "1479454",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479454"
      },
      {
        "category": "external",
        "summary": "1479478",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479478"
      },
      {
        "category": "external",
        "summary": "1479481",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479481"
      },
      {
        "category": "external",
        "summary": "1479802",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479802"
      },
      {
        "category": "external",
        "summary": "1479805",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479805"
      },
      {
        "category": "external",
        "summary": "1479886",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479886"
      },
      {
        "category": "external",
        "summary": "1479917",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479917"
      },
      {
        "category": "external",
        "summary": "1479920",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479920"
      },
      {
        "category": "external",
        "summary": "1479922",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479922"
      },
      {
        "category": "external",
        "summary": "1479923",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479923"
      },
      {
        "category": "external",
        "summary": "1479924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479924"
      },
      {
        "category": "external",
        "summary": "1479925",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479925"
      },
      {
        "category": "external",
        "summary": "1479926",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479926"
      },
      {
        "category": "external",
        "summary": "1479927",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479927"
      },
      {
        "category": "external",
        "summary": "1479929",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479929"
      },
      {
        "category": "external",
        "summary": "1479931",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479931"
      },
      {
        "category": "external",
        "summary": "1479935",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479935"
      },
      {
        "category": "external",
        "summary": "1479937",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479937"
      },
      {
        "category": "external",
        "summary": "1479938",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479938"
      },
      {
        "category": "external",
        "summary": "1479941",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479941"
      },
      {
        "category": "external",
        "summary": "1479943",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479943"
      },
      {
        "category": "external",
        "summary": "1479944",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479944"
      },
      {
        "category": "external",
        "summary": "1479959",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479959"
      },
      {
        "category": "external",
        "summary": "1479972",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479972"
      },
      {
        "category": "external",
        "summary": "1479976",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479976"
      },
      {
        "category": "external",
        "summary": "1479978",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479978"
      },
      {
        "category": "external",
        "summary": "1479991",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479991"
      },
      {
        "category": "external",
        "summary": "1479993",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479993"
      },
      {
        "category": "external",
        "summary": "1479994",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479994"
      },
      {
        "category": "external",
        "summary": "1480000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480000"
      },
      {
        "category": "external",
        "summary": "1480001",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480001"
      },
      {
        "category": "external",
        "summary": "1480002",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480002"
      },
      {
        "category": "external",
        "summary": "1480007",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480007"
      },
      {
        "category": "external",
        "summary": "1480008",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480008"
      },
      {
        "category": "external",
        "summary": "1480286",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480286"
      },
      {
        "category": "external",
        "summary": "1480377",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480377"
      },
      {
        "category": "external",
        "summary": "1480586",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480586"
      },
      {
        "category": "external",
        "summary": "1480588",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480588"
      },
      {
        "category": "external",
        "summary": "1480589",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480589"
      },
      {
        "category": "external",
        "summary": "1480654",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480654"
      },
      {
        "category": "external",
        "summary": "1480734",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480734"
      },
      {
        "category": "external",
        "summary": "1481296",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481296"
      },
      {
        "category": "external",
        "summary": "1481436",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481436"
      },
      {
        "category": "external",
        "summary": "1481437",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481437"
      },
      {
        "category": "external",
        "summary": "1481439",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481439"
      },
      {
        "category": "external",
        "summary": "1481442",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481442"
      },
      {
        "category": "external",
        "summary": "1481445",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481445"
      },
      {
        "category": "external",
        "summary": "1481449",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481449"
      },
      {
        "category": "external",
        "summary": "1481450",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481450"
      },
      {
        "category": "external",
        "summary": "1481845",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481845"
      },
      {
        "category": "external",
        "summary": "1481846",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481846"
      },
      {
        "category": "external",
        "summary": "1481849",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481849"
      },
      {
        "category": "external",
        "summary": "1481851",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481851"
      },
      {
        "category": "external",
        "summary": "1481853",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481853"
      },
      {
        "category": "external",
        "summary": "1482131",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482131"
      },
      {
        "category": "external",
        "summary": "1482136",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482136"
      },
      {
        "category": "external",
        "summary": "1482148",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482148"
      },
      {
        "category": "external",
        "summary": "1482170",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482170"
      },
      {
        "category": "external",
        "summary": "1482666",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482666"
      },
      {
        "category": "external",
        "summary": "1482667",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482667"
      },
      {
        "category": "external",
        "summary": "1482668",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482668"
      },
      {
        "category": "external",
        "summary": "1482669",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482669"
      },
      {
        "category": "external",
        "summary": "1482670",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482670"
      },
      {
        "category": "external",
        "summary": "1484373",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484373"
      },
      {
        "category": "external",
        "summary": "1484374",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484374"
      },
      {
        "category": "external",
        "summary": "1484385",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484385"
      },
      {
        "category": "external",
        "summary": "1484424",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484424"
      },
      {
        "category": "external",
        "summary": "1484539",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484539"
      },
      {
        "category": "external",
        "summary": "1484548",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484548"
      },
      {
        "category": "external",
        "summary": "1484608",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484608"
      },
      {
        "category": "external",
        "summary": "1484613",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484613"
      },
      {
        "category": "external",
        "summary": "1484895",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484895"
      },
      {
        "category": "external",
        "summary": "1484901",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484901"
      },
      {
        "category": "external",
        "summary": "1484904",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484904"
      },
      {
        "category": "external",
        "summary": "1484956",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484956"
      },
      {
        "category": "external",
        "summary": "1484984",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484984"
      },
      {
        "category": "external",
        "summary": "1485474",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1485474"
      },
      {
        "category": "external",
        "summary": "1486351",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486351"
      },
      {
        "category": "external",
        "summary": "1486474",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486474"
      },
      {
        "category": "external",
        "summary": "1487283",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487283"
      },
      {
        "category": "external",
        "summary": "1487320",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487320"
      },
      {
        "category": "external",
        "summary": "1487689",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487689"
      },
      {
        "category": "external",
        "summary": "1488967",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488967"
      },
      {
        "category": "external",
        "summary": "1489974",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489974"
      },
      {
        "category": "external",
        "summary": "1491310",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1491310"
      },
      {
        "category": "external",
        "summary": "1492840",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1492840"
      },
      {
        "category": "external",
        "summary": "1493207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493207"
      },
      {
        "category": "external",
        "summary": "1494561",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494561"
      },
      {
        "category": "external",
        "summary": "1496912",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1496912"
      },
      {
        "category": "external",
        "summary": "1496946",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1496946"
      },
      {
        "category": "external",
        "summary": "1497746",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1497746"
      },
      {
        "category": "external",
        "summary": "1497817",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1497817"
      },
      {
        "category": "external",
        "summary": "1497835",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1497835"
      },
      {
        "category": "external",
        "summary": "1498230",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1498230"
      },
      {
        "category": "external",
        "summary": "1498556",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1498556"
      },
      {
        "category": "external",
        "summary": "1499868",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1499868"
      },
      {
        "category": "external",
        "summary": "1500049",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500049"
      },
      {
        "category": "external",
        "summary": "1500051",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500051"
      },
      {
        "category": "external",
        "summary": "1500053",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500053"
      },
      {
        "category": "external",
        "summary": "1502738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502738"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3005.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat CloudForms security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T17:01:36+00:00",
      "generator": {
        "date": "2025-10-09T17:01:36+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:3005",
      "initial_release_date": "2017-10-24T00:15:49+00:00",
      "revision_history": [
        {
          "date": "2017-10-24T00:15:49+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-10-24T00:15:49+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T17:01:36+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "CloudForms Management Engine 5.8",
                "product": {
                  "name": "CloudForms Management Engine 5.8",
                  "product_id": "7Server-RH7-CFME-5.8",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.8::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat CloudForms"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ansible-tower-server-0:3.1.5-1.el7at.x86_64",
                "product": {
                  "name": "ansible-tower-server-0:3.1.5-1.el7at.x86_64",
                  "product_id": "ansible-tower-server-0:3.1.5-1.el7at.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ansible-tower-server@3.1.5-1.el7at?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
                "product": {
                  "name": "ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
                  "product_id": "ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ansible-tower-setup@3.1.5-1.el7at?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
                "product": {
                  "name": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
                  "product_id": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-nokogiri@1.8.1-2.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
                "product": {
                  "name": "rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
                  "product_id": "rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-nokogiri-debuginfo@1.8.1-2.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
                "product": {
                  "name": "rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
                  "product_id": "rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-nokogiri-doc@1.8.1-2.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-0:5.8.2.3-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-0:5.8.2.3-1.el7cf.x86_64",
                  "product_id": "cfme-0:5.8.2.3-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme@5.8.2.3-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
                  "product_id": "cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-debuginfo@5.8.2.3-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
                  "product_id": "cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-appliance@5.8.2.3-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
                  "product_id": "cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-appliance-debuginfo@5.8.2.3-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
                  "product_id": "cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-gemset@5.8.2.3-1.el7cf?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "supervisor-0:3.1.4-1.el7.src",
                "product": {
                  "name": "supervisor-0:3.1.4-1.el7.src",
                  "product_id": "supervisor-0:3.1.4-1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/supervisor@3.1.4-1.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rabbitmq-server-0:3.6.9-1.el7at.src",
                "product": {
                  "name": "rabbitmq-server-0:3.6.9-1.el7at.src",
                  "product_id": "rabbitmq-server-0:3.6.9-1.el7at.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rabbitmq-server@3.6.9-1.el7at?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
                "product": {
                  "name": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
                  "product_id": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-nokogiri@1.8.1-2.el7cf?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-0:5.8.2.3-1.el7cf.src",
                "product": {
                  "name": "cfme-0:5.8.2.3-1.el7cf.src",
                  "product_id": "cfme-0:5.8.2.3-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme@5.8.2.3-1.el7cf?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-appliance-0:5.8.2.3-1.el7cf.src",
                "product": {
                  "name": "cfme-appliance-0:5.8.2.3-1.el7cf.src",
                  "product_id": "cfme-appliance-0:5.8.2.3-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-appliance@5.8.2.3-1.el7cf?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-gemset-0:5.8.2.3-1.el7cf.src",
                "product": {
                  "name": "cfme-gemset-0:5.8.2.3-1.el7cf.src",
                  "product_id": "cfme-gemset-0:5.8.2.3-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-gemset@5.8.2.3-1.el7cf?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "supervisor-0:3.1.4-1.el7.noarch",
                "product": {
                  "name": "supervisor-0:3.1.4-1.el7.noarch",
                  "product_id": "supervisor-0:3.1.4-1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/supervisor@3.1.4-1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rabbitmq-server-0:3.6.9-1.el7at.noarch",
                "product": {
                  "name": "rabbitmq-server-0:3.6.9-1.el7at.noarch",
                  "product_id": "rabbitmq-server-0:3.6.9-1.el7at.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rabbitmq-server@3.6.9-1.el7at?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ansible-tower-server-0:3.1.5-1.el7at.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.5-1.el7at.x86_64"
        },
        "product_reference": "ansible-tower-server-0:3.1.5-1.el7at.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ansible-tower-setup-0:3.1.5-1.el7at.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.5-1.el7at.x86_64"
        },
        "product_reference": "ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-0:5.8.2.3-1.el7cf.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.src"
        },
        "product_reference": "cfme-0:5.8.2.3-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-0:5.8.2.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.x86_64"
        },
        "product_reference": "cfme-0:5.8.2.3-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-appliance-0:5.8.2.3-1.el7cf.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.src"
        },
        "product_reference": "cfme-appliance-0:5.8.2.3-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-appliance-0:5.8.2.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.x86_64"
        },
        "product_reference": "cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64"
        },
        "product_reference": "cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64"
        },
        "product_reference": "cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-gemset-0:5.8.2.3-1.el7cf.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.src"
        },
        "product_reference": "cfme-gemset-0:5.8.2.3-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-gemset-0:5.8.2.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.x86_64"
        },
        "product_reference": "cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rabbitmq-server-0:3.6.9-1.el7at.noarch as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.noarch"
        },
        "product_reference": "rabbitmq-server-0:3.6.9-1.el7at.noarch",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rabbitmq-server-0:3.6.9-1.el7at.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.src"
        },
        "product_reference": "rabbitmq-server-0:3.6.9-1.el7at.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src"
        },
        "product_reference": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64"
        },
        "product_reference": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64"
        },
        "product_reference": "rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64"
        },
        "product_reference": "rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "supervisor-0:3.1.4-1.el7.noarch as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.noarch"
        },
        "product_reference": "supervisor-0:3.1.4-1.el7.noarch",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "supervisor-0:3.1.4-1.el7.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.src"
        },
        "product_reference": "supervisor-0:3.1.4-1.el7.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-11610",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "discovery_date": "2017-07-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1476143"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the XML-RPC interface in supervisord. When processing malformed commands, an attacker can cause arbitrary shell commands to be executed on the server as the same user as supervisord. Exploitation requires the attacker to first be authenticated to the supervisord service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "supervisor: Command injection via malicious XML-RPC request",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.5-1.el7at.x86_64",
          "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
          "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.noarch",
          "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.src",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.noarch",
          "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-11610"
        },
        {
          "category": "external",
          "summary": "RHBZ#1476143",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1476143"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-11610",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-11610"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-11610",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11610"
        }
      ],
      "release_date": "2017-07-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-10-24T00:15:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.noarch",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.noarch",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3005"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.noarch",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.noarch",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "supervisor: Command injection via malicious XML-RPC request"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Ryan Petrello"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2017-12148",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2017-08-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1485474"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Tower\u0027s interface with SCM repositories. If a Tower project (SCM repository) definition does not have the \u0027delete before update\u0027 flag set, an attacker with commit access to the upstream playbook source repository could create a Trojan playbook that, when executed by Tower, modifies the checked out SCM repository to add git hooks. These git hooks could, in turn, cause arbitrary command and code execution as the user Tower runs as.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Tower: modification of git hooks in SCM repo via upstream playbook execution",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.5-1.el7at.x86_64",
          "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
          "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.noarch",
          "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.src",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.noarch",
          "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-12148"
        },
        {
          "category": "external",
          "summary": "RHBZ#1485474",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1485474"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12148",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-12148"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12148",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12148"
        }
      ],
      "release_date": "2017-09-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-10-24T00:15:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.noarch",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.noarch",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3005"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.noarch",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.noarch",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "Tower: modification of git hooks in SCM repo via upstream playbook execution"
    }
  ]
}
  rhsa-2017:3005
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for CloudForms Management Engine 5.8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.\n\nThe following packages have been upgraded to a later upstream version: ansible-tower (3.1.5), cfme (5.8.2.3), cfme-appliance (5.8.2.3), cfme-gemset (5.8.2.3), rabbitmq-server (3.6.9), rh-ruby23-rubygem-nokogiri (1.8.1), supervisor (3.1.4). (BZ#1476286, BZ#1485484)\n\nSecurity Fix(es):\n\n* A flaw was found in Tower\u0027s interface with SCM repositories. If a Tower project (SCM repository) definition does not have the \u0027delete before update\u0027 flag set, an attacker with commit access to the upstream playbook source repository could create a Trojan playbook that, when executed by Tower, modifies the checked out SCM repository to add git hooks. These git hooks could, in turn, cause arbitrary command and code execution as the user Tower runs as. (CVE-2017-12148)\n\n* A vulnerability was found in the XML-RPC interface in supervisord. When processing malformed commands, an attacker can cause arbitrary shell commands to be executed on the server as the same user as supervisord. Exploitation requires the attacker to first be authenticated to the supervisord service. (CVE-2017-11610)\n\nThe CVE-2017-12148 issue was discovered by Ryan Petrello (Red Hat).\n\nAdditional Changes:\n\nThis update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3005",
        "url": "https://access.redhat.com/errata/RHSA-2017:3005"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_cloudforms/4.5/html/release_notes/index#red_hat_cloudforms_4_5_2",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_cloudforms/4.5/html/release_notes/index#red_hat_cloudforms_4_5_2"
      },
      {
        "category": "external",
        "summary": "1439650",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1439650"
      },
      {
        "category": "external",
        "summary": "1459987",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459987"
      },
      {
        "category": "external",
        "summary": "1459996",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459996"
      },
      {
        "category": "external",
        "summary": "1460754",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1460754"
      },
      {
        "category": "external",
        "summary": "1461061",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461061"
      },
      {
        "category": "external",
        "summary": "1465087",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1465087"
      },
      {
        "category": "external",
        "summary": "1465089",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1465089"
      },
      {
        "category": "external",
        "summary": "1471709",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471709"
      },
      {
        "category": "external",
        "summary": "1476143",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1476143"
      },
      {
        "category": "external",
        "summary": "1477194",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477194"
      },
      {
        "category": "external",
        "summary": "1477616",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477616"
      },
      {
        "category": "external",
        "summary": "1477701",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477701"
      },
      {
        "category": "external",
        "summary": "1477702",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477702"
      },
      {
        "category": "external",
        "summary": "1478367",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478367"
      },
      {
        "category": "external",
        "summary": "1478372",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478372"
      },
      {
        "category": "external",
        "summary": "1478379",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478379"
      },
      {
        "category": "external",
        "summary": "1478391",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478391"
      },
      {
        "category": "external",
        "summary": "1478398",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478398"
      },
      {
        "category": "external",
        "summary": "1478400",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478400"
      },
      {
        "category": "external",
        "summary": "1478406",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478406"
      },
      {
        "category": "external",
        "summary": "1478407",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478407"
      },
      {
        "category": "external",
        "summary": "1478409",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478409"
      },
      {
        "category": "external",
        "summary": "1478415",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478415"
      },
      {
        "category": "external",
        "summary": "1478418",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478418"
      },
      {
        "category": "external",
        "summary": "1478421",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478421"
      },
      {
        "category": "external",
        "summary": "1478428",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478428"
      },
      {
        "category": "external",
        "summary": "1478429",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478429"
      },
      {
        "category": "external",
        "summary": "1478434",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478434"
      },
      {
        "category": "external",
        "summary": "1478435",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478435"
      },
      {
        "category": "external",
        "summary": "1478436",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478436"
      },
      {
        "category": "external",
        "summary": "1478506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478506"
      },
      {
        "category": "external",
        "summary": "1478508",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478508"
      },
      {
        "category": "external",
        "summary": "1478510",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478510"
      },
      {
        "category": "external",
        "summary": "1478513",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478513"
      },
      {
        "category": "external",
        "summary": "1478515",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478515"
      },
      {
        "category": "external",
        "summary": "1478523",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478523"
      },
      {
        "category": "external",
        "summary": "1478526",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478526"
      },
      {
        "category": "external",
        "summary": "1478527",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478527"
      },
      {
        "category": "external",
        "summary": "1478529",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478529"
      },
      {
        "category": "external",
        "summary": "1478532",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478532"
      },
      {
        "category": "external",
        "summary": "1478535",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478535"
      },
      {
        "category": "external",
        "summary": "1478542",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478542"
      },
      {
        "category": "external",
        "summary": "1478544",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478544"
      },
      {
        "category": "external",
        "summary": "1478554",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478554"
      },
      {
        "category": "external",
        "summary": "1478557",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478557"
      },
      {
        "category": "external",
        "summary": "1478558",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478558"
      },
      {
        "category": "external",
        "summary": "1478560",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478560"
      },
      {
        "category": "external",
        "summary": "1478562",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478562"
      },
      {
        "category": "external",
        "summary": "1478563",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478563"
      },
      {
        "category": "external",
        "summary": "1478565",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478565"
      },
      {
        "category": "external",
        "summary": "1478568",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478568"
      },
      {
        "category": "external",
        "summary": "1478571",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478571"
      },
      {
        "category": "external",
        "summary": "1479367",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479367"
      },
      {
        "category": "external",
        "summary": "1479405",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479405"
      },
      {
        "category": "external",
        "summary": "1479407",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479407"
      },
      {
        "category": "external",
        "summary": "1479409",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479409"
      },
      {
        "category": "external",
        "summary": "1479414",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479414"
      },
      {
        "category": "external",
        "summary": "1479423",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479423"
      },
      {
        "category": "external",
        "summary": "1479437",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479437"
      },
      {
        "category": "external",
        "summary": "1479453",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479453"
      },
      {
        "category": "external",
        "summary": "1479454",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479454"
      },
      {
        "category": "external",
        "summary": "1479478",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479478"
      },
      {
        "category": "external",
        "summary": "1479481",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479481"
      },
      {
        "category": "external",
        "summary": "1479802",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479802"
      },
      {
        "category": "external",
        "summary": "1479805",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479805"
      },
      {
        "category": "external",
        "summary": "1479886",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479886"
      },
      {
        "category": "external",
        "summary": "1479917",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479917"
      },
      {
        "category": "external",
        "summary": "1479920",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479920"
      },
      {
        "category": "external",
        "summary": "1479922",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479922"
      },
      {
        "category": "external",
        "summary": "1479923",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479923"
      },
      {
        "category": "external",
        "summary": "1479924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479924"
      },
      {
        "category": "external",
        "summary": "1479925",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479925"
      },
      {
        "category": "external",
        "summary": "1479926",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479926"
      },
      {
        "category": "external",
        "summary": "1479927",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479927"
      },
      {
        "category": "external",
        "summary": "1479929",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479929"
      },
      {
        "category": "external",
        "summary": "1479931",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479931"
      },
      {
        "category": "external",
        "summary": "1479935",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479935"
      },
      {
        "category": "external",
        "summary": "1479937",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479937"
      },
      {
        "category": "external",
        "summary": "1479938",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479938"
      },
      {
        "category": "external",
        "summary": "1479941",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479941"
      },
      {
        "category": "external",
        "summary": "1479943",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479943"
      },
      {
        "category": "external",
        "summary": "1479944",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479944"
      },
      {
        "category": "external",
        "summary": "1479959",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479959"
      },
      {
        "category": "external",
        "summary": "1479972",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479972"
      },
      {
        "category": "external",
        "summary": "1479976",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479976"
      },
      {
        "category": "external",
        "summary": "1479978",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479978"
      },
      {
        "category": "external",
        "summary": "1479991",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479991"
      },
      {
        "category": "external",
        "summary": "1479993",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479993"
      },
      {
        "category": "external",
        "summary": "1479994",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479994"
      },
      {
        "category": "external",
        "summary": "1480000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480000"
      },
      {
        "category": "external",
        "summary": "1480001",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480001"
      },
      {
        "category": "external",
        "summary": "1480002",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480002"
      },
      {
        "category": "external",
        "summary": "1480007",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480007"
      },
      {
        "category": "external",
        "summary": "1480008",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480008"
      },
      {
        "category": "external",
        "summary": "1480286",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480286"
      },
      {
        "category": "external",
        "summary": "1480377",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480377"
      },
      {
        "category": "external",
        "summary": "1480586",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480586"
      },
      {
        "category": "external",
        "summary": "1480588",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480588"
      },
      {
        "category": "external",
        "summary": "1480589",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480589"
      },
      {
        "category": "external",
        "summary": "1480654",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480654"
      },
      {
        "category": "external",
        "summary": "1480734",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480734"
      },
      {
        "category": "external",
        "summary": "1481296",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481296"
      },
      {
        "category": "external",
        "summary": "1481436",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481436"
      },
      {
        "category": "external",
        "summary": "1481437",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481437"
      },
      {
        "category": "external",
        "summary": "1481439",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481439"
      },
      {
        "category": "external",
        "summary": "1481442",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481442"
      },
      {
        "category": "external",
        "summary": "1481445",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481445"
      },
      {
        "category": "external",
        "summary": "1481449",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481449"
      },
      {
        "category": "external",
        "summary": "1481450",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481450"
      },
      {
        "category": "external",
        "summary": "1481845",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481845"
      },
      {
        "category": "external",
        "summary": "1481846",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481846"
      },
      {
        "category": "external",
        "summary": "1481849",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481849"
      },
      {
        "category": "external",
        "summary": "1481851",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481851"
      },
      {
        "category": "external",
        "summary": "1481853",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481853"
      },
      {
        "category": "external",
        "summary": "1482131",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482131"
      },
      {
        "category": "external",
        "summary": "1482136",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482136"
      },
      {
        "category": "external",
        "summary": "1482148",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482148"
      },
      {
        "category": "external",
        "summary": "1482170",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482170"
      },
      {
        "category": "external",
        "summary": "1482666",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482666"
      },
      {
        "category": "external",
        "summary": "1482667",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482667"
      },
      {
        "category": "external",
        "summary": "1482668",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482668"
      },
      {
        "category": "external",
        "summary": "1482669",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482669"
      },
      {
        "category": "external",
        "summary": "1482670",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482670"
      },
      {
        "category": "external",
        "summary": "1484373",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484373"
      },
      {
        "category": "external",
        "summary": "1484374",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484374"
      },
      {
        "category": "external",
        "summary": "1484385",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484385"
      },
      {
        "category": "external",
        "summary": "1484424",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484424"
      },
      {
        "category": "external",
        "summary": "1484539",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484539"
      },
      {
        "category": "external",
        "summary": "1484548",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484548"
      },
      {
        "category": "external",
        "summary": "1484608",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484608"
      },
      {
        "category": "external",
        "summary": "1484613",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484613"
      },
      {
        "category": "external",
        "summary": "1484895",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484895"
      },
      {
        "category": "external",
        "summary": "1484901",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484901"
      },
      {
        "category": "external",
        "summary": "1484904",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484904"
      },
      {
        "category": "external",
        "summary": "1484956",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484956"
      },
      {
        "category": "external",
        "summary": "1484984",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484984"
      },
      {
        "category": "external",
        "summary": "1485474",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1485474"
      },
      {
        "category": "external",
        "summary": "1486351",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486351"
      },
      {
        "category": "external",
        "summary": "1486474",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486474"
      },
      {
        "category": "external",
        "summary": "1487283",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487283"
      },
      {
        "category": "external",
        "summary": "1487320",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487320"
      },
      {
        "category": "external",
        "summary": "1487689",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487689"
      },
      {
        "category": "external",
        "summary": "1488967",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488967"
      },
      {
        "category": "external",
        "summary": "1489974",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489974"
      },
      {
        "category": "external",
        "summary": "1491310",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1491310"
      },
      {
        "category": "external",
        "summary": "1492840",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1492840"
      },
      {
        "category": "external",
        "summary": "1493207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493207"
      },
      {
        "category": "external",
        "summary": "1494561",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494561"
      },
      {
        "category": "external",
        "summary": "1496912",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1496912"
      },
      {
        "category": "external",
        "summary": "1496946",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1496946"
      },
      {
        "category": "external",
        "summary": "1497746",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1497746"
      },
      {
        "category": "external",
        "summary": "1497817",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1497817"
      },
      {
        "category": "external",
        "summary": "1497835",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1497835"
      },
      {
        "category": "external",
        "summary": "1498230",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1498230"
      },
      {
        "category": "external",
        "summary": "1498556",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1498556"
      },
      {
        "category": "external",
        "summary": "1499868",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1499868"
      },
      {
        "category": "external",
        "summary": "1500049",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500049"
      },
      {
        "category": "external",
        "summary": "1500051",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500051"
      },
      {
        "category": "external",
        "summary": "1500053",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500053"
      },
      {
        "category": "external",
        "summary": "1502738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502738"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3005.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat CloudForms security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T17:01:36+00:00",
      "generator": {
        "date": "2025-10-09T17:01:36+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:3005",
      "initial_release_date": "2017-10-24T00:15:49+00:00",
      "revision_history": [
        {
          "date": "2017-10-24T00:15:49+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-10-24T00:15:49+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T17:01:36+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "CloudForms Management Engine 5.8",
                "product": {
                  "name": "CloudForms Management Engine 5.8",
                  "product_id": "7Server-RH7-CFME-5.8",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.8::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat CloudForms"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ansible-tower-server-0:3.1.5-1.el7at.x86_64",
                "product": {
                  "name": "ansible-tower-server-0:3.1.5-1.el7at.x86_64",
                  "product_id": "ansible-tower-server-0:3.1.5-1.el7at.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ansible-tower-server@3.1.5-1.el7at?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
                "product": {
                  "name": "ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
                  "product_id": "ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ansible-tower-setup@3.1.5-1.el7at?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
                "product": {
                  "name": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
                  "product_id": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-nokogiri@1.8.1-2.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
                "product": {
                  "name": "rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
                  "product_id": "rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-nokogiri-debuginfo@1.8.1-2.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
                "product": {
                  "name": "rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
                  "product_id": "rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-nokogiri-doc@1.8.1-2.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-0:5.8.2.3-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-0:5.8.2.3-1.el7cf.x86_64",
                  "product_id": "cfme-0:5.8.2.3-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme@5.8.2.3-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
                  "product_id": "cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-debuginfo@5.8.2.3-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
                  "product_id": "cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-appliance@5.8.2.3-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
                  "product_id": "cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-appliance-debuginfo@5.8.2.3-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
                  "product_id": "cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-gemset@5.8.2.3-1.el7cf?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "supervisor-0:3.1.4-1.el7.src",
                "product": {
                  "name": "supervisor-0:3.1.4-1.el7.src",
                  "product_id": "supervisor-0:3.1.4-1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/supervisor@3.1.4-1.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rabbitmq-server-0:3.6.9-1.el7at.src",
                "product": {
                  "name": "rabbitmq-server-0:3.6.9-1.el7at.src",
                  "product_id": "rabbitmq-server-0:3.6.9-1.el7at.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rabbitmq-server@3.6.9-1.el7at?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
                "product": {
                  "name": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
                  "product_id": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-nokogiri@1.8.1-2.el7cf?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-0:5.8.2.3-1.el7cf.src",
                "product": {
                  "name": "cfme-0:5.8.2.3-1.el7cf.src",
                  "product_id": "cfme-0:5.8.2.3-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme@5.8.2.3-1.el7cf?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-appliance-0:5.8.2.3-1.el7cf.src",
                "product": {
                  "name": "cfme-appliance-0:5.8.2.3-1.el7cf.src",
                  "product_id": "cfme-appliance-0:5.8.2.3-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-appliance@5.8.2.3-1.el7cf?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-gemset-0:5.8.2.3-1.el7cf.src",
                "product": {
                  "name": "cfme-gemset-0:5.8.2.3-1.el7cf.src",
                  "product_id": "cfme-gemset-0:5.8.2.3-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-gemset@5.8.2.3-1.el7cf?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "supervisor-0:3.1.4-1.el7.noarch",
                "product": {
                  "name": "supervisor-0:3.1.4-1.el7.noarch",
                  "product_id": "supervisor-0:3.1.4-1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/supervisor@3.1.4-1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rabbitmq-server-0:3.6.9-1.el7at.noarch",
                "product": {
                  "name": "rabbitmq-server-0:3.6.9-1.el7at.noarch",
                  "product_id": "rabbitmq-server-0:3.6.9-1.el7at.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rabbitmq-server@3.6.9-1.el7at?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ansible-tower-server-0:3.1.5-1.el7at.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.5-1.el7at.x86_64"
        },
        "product_reference": "ansible-tower-server-0:3.1.5-1.el7at.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ansible-tower-setup-0:3.1.5-1.el7at.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.5-1.el7at.x86_64"
        },
        "product_reference": "ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-0:5.8.2.3-1.el7cf.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.src"
        },
        "product_reference": "cfme-0:5.8.2.3-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-0:5.8.2.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.x86_64"
        },
        "product_reference": "cfme-0:5.8.2.3-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-appliance-0:5.8.2.3-1.el7cf.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.src"
        },
        "product_reference": "cfme-appliance-0:5.8.2.3-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-appliance-0:5.8.2.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.x86_64"
        },
        "product_reference": "cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64"
        },
        "product_reference": "cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64"
        },
        "product_reference": "cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-gemset-0:5.8.2.3-1.el7cf.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.src"
        },
        "product_reference": "cfme-gemset-0:5.8.2.3-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-gemset-0:5.8.2.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.x86_64"
        },
        "product_reference": "cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rabbitmq-server-0:3.6.9-1.el7at.noarch as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.noarch"
        },
        "product_reference": "rabbitmq-server-0:3.6.9-1.el7at.noarch",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rabbitmq-server-0:3.6.9-1.el7at.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.src"
        },
        "product_reference": "rabbitmq-server-0:3.6.9-1.el7at.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src"
        },
        "product_reference": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64"
        },
        "product_reference": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64"
        },
        "product_reference": "rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64"
        },
        "product_reference": "rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "supervisor-0:3.1.4-1.el7.noarch as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.noarch"
        },
        "product_reference": "supervisor-0:3.1.4-1.el7.noarch",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "supervisor-0:3.1.4-1.el7.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.src"
        },
        "product_reference": "supervisor-0:3.1.4-1.el7.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-11610",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "discovery_date": "2017-07-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1476143"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the XML-RPC interface in supervisord. When processing malformed commands, an attacker can cause arbitrary shell commands to be executed on the server as the same user as supervisord. Exploitation requires the attacker to first be authenticated to the supervisord service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "supervisor: Command injection via malicious XML-RPC request",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.5-1.el7at.x86_64",
          "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
          "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.noarch",
          "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.src",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.noarch",
          "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-11610"
        },
        {
          "category": "external",
          "summary": "RHBZ#1476143",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1476143"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-11610",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-11610"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-11610",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11610"
        }
      ],
      "release_date": "2017-07-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-10-24T00:15:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.noarch",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.noarch",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3005"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.noarch",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.noarch",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "supervisor: Command injection via malicious XML-RPC request"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Ryan Petrello"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2017-12148",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2017-08-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1485474"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Tower\u0027s interface with SCM repositories. If a Tower project (SCM repository) definition does not have the \u0027delete before update\u0027 flag set, an attacker with commit access to the upstream playbook source repository could create a Trojan playbook that, when executed by Tower, modifies the checked out SCM repository to add git hooks. These git hooks could, in turn, cause arbitrary command and code execution as the user Tower runs as.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Tower: modification of git hooks in SCM repo via upstream playbook execution",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.5-1.el7at.x86_64",
          "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
          "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.noarch",
          "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.src",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.noarch",
          "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-12148"
        },
        {
          "category": "external",
          "summary": "RHBZ#1485474",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1485474"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12148",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-12148"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12148",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12148"
        }
      ],
      "release_date": "2017-09-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-10-24T00:15:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.noarch",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.noarch",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3005"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.noarch",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.noarch",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "Tower: modification of git hooks in SCM repo via upstream playbook execution"
    }
  ]
}
  rhsa-2017_3005
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for CloudForms Management Engine 5.8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.\n\nThe following packages have been upgraded to a later upstream version: ansible-tower (3.1.5), cfme (5.8.2.3), cfme-appliance (5.8.2.3), cfme-gemset (5.8.2.3), rabbitmq-server (3.6.9), rh-ruby23-rubygem-nokogiri (1.8.1), supervisor (3.1.4). (BZ#1476286, BZ#1485484)\n\nSecurity Fix(es):\n\n* A flaw was found in Tower\u0027s interface with SCM repositories. If a Tower project (SCM repository) definition does not have the \u0027delete before update\u0027 flag set, an attacker with commit access to the upstream playbook source repository could create a Trojan playbook that, when executed by Tower, modifies the checked out SCM repository to add git hooks. These git hooks could, in turn, cause arbitrary command and code execution as the user Tower runs as. (CVE-2017-12148)\n\n* A vulnerability was found in the XML-RPC interface in supervisord. When processing malformed commands, an attacker can cause arbitrary shell commands to be executed on the server as the same user as supervisord. Exploitation requires the attacker to first be authenticated to the supervisord service. (CVE-2017-11610)\n\nThe CVE-2017-12148 issue was discovered by Ryan Petrello (Red Hat).\n\nAdditional Changes:\n\nThis update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3005",
        "url": "https://access.redhat.com/errata/RHSA-2017:3005"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_cloudforms/4.5/html/release_notes/index#red_hat_cloudforms_4_5_2",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_cloudforms/4.5/html/release_notes/index#red_hat_cloudforms_4_5_2"
      },
      {
        "category": "external",
        "summary": "1439650",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1439650"
      },
      {
        "category": "external",
        "summary": "1459987",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459987"
      },
      {
        "category": "external",
        "summary": "1459996",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459996"
      },
      {
        "category": "external",
        "summary": "1460754",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1460754"
      },
      {
        "category": "external",
        "summary": "1461061",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461061"
      },
      {
        "category": "external",
        "summary": "1465087",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1465087"
      },
      {
        "category": "external",
        "summary": "1465089",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1465089"
      },
      {
        "category": "external",
        "summary": "1471709",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471709"
      },
      {
        "category": "external",
        "summary": "1476143",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1476143"
      },
      {
        "category": "external",
        "summary": "1477194",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477194"
      },
      {
        "category": "external",
        "summary": "1477616",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477616"
      },
      {
        "category": "external",
        "summary": "1477701",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477701"
      },
      {
        "category": "external",
        "summary": "1477702",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477702"
      },
      {
        "category": "external",
        "summary": "1478367",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478367"
      },
      {
        "category": "external",
        "summary": "1478372",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478372"
      },
      {
        "category": "external",
        "summary": "1478379",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478379"
      },
      {
        "category": "external",
        "summary": "1478391",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478391"
      },
      {
        "category": "external",
        "summary": "1478398",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478398"
      },
      {
        "category": "external",
        "summary": "1478400",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478400"
      },
      {
        "category": "external",
        "summary": "1478406",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478406"
      },
      {
        "category": "external",
        "summary": "1478407",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478407"
      },
      {
        "category": "external",
        "summary": "1478409",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478409"
      },
      {
        "category": "external",
        "summary": "1478415",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478415"
      },
      {
        "category": "external",
        "summary": "1478418",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478418"
      },
      {
        "category": "external",
        "summary": "1478421",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478421"
      },
      {
        "category": "external",
        "summary": "1478428",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478428"
      },
      {
        "category": "external",
        "summary": "1478429",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478429"
      },
      {
        "category": "external",
        "summary": "1478434",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478434"
      },
      {
        "category": "external",
        "summary": "1478435",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478435"
      },
      {
        "category": "external",
        "summary": "1478436",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478436"
      },
      {
        "category": "external",
        "summary": "1478506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478506"
      },
      {
        "category": "external",
        "summary": "1478508",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478508"
      },
      {
        "category": "external",
        "summary": "1478510",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478510"
      },
      {
        "category": "external",
        "summary": "1478513",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478513"
      },
      {
        "category": "external",
        "summary": "1478515",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478515"
      },
      {
        "category": "external",
        "summary": "1478523",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478523"
      },
      {
        "category": "external",
        "summary": "1478526",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478526"
      },
      {
        "category": "external",
        "summary": "1478527",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478527"
      },
      {
        "category": "external",
        "summary": "1478529",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478529"
      },
      {
        "category": "external",
        "summary": "1478532",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478532"
      },
      {
        "category": "external",
        "summary": "1478535",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478535"
      },
      {
        "category": "external",
        "summary": "1478542",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478542"
      },
      {
        "category": "external",
        "summary": "1478544",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478544"
      },
      {
        "category": "external",
        "summary": "1478554",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478554"
      },
      {
        "category": "external",
        "summary": "1478557",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478557"
      },
      {
        "category": "external",
        "summary": "1478558",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478558"
      },
      {
        "category": "external",
        "summary": "1478560",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478560"
      },
      {
        "category": "external",
        "summary": "1478562",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478562"
      },
      {
        "category": "external",
        "summary": "1478563",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478563"
      },
      {
        "category": "external",
        "summary": "1478565",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478565"
      },
      {
        "category": "external",
        "summary": "1478568",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478568"
      },
      {
        "category": "external",
        "summary": "1478571",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478571"
      },
      {
        "category": "external",
        "summary": "1479367",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479367"
      },
      {
        "category": "external",
        "summary": "1479405",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479405"
      },
      {
        "category": "external",
        "summary": "1479407",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479407"
      },
      {
        "category": "external",
        "summary": "1479409",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479409"
      },
      {
        "category": "external",
        "summary": "1479414",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479414"
      },
      {
        "category": "external",
        "summary": "1479423",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479423"
      },
      {
        "category": "external",
        "summary": "1479437",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479437"
      },
      {
        "category": "external",
        "summary": "1479453",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479453"
      },
      {
        "category": "external",
        "summary": "1479454",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479454"
      },
      {
        "category": "external",
        "summary": "1479478",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479478"
      },
      {
        "category": "external",
        "summary": "1479481",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479481"
      },
      {
        "category": "external",
        "summary": "1479802",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479802"
      },
      {
        "category": "external",
        "summary": "1479805",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479805"
      },
      {
        "category": "external",
        "summary": "1479886",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479886"
      },
      {
        "category": "external",
        "summary": "1479917",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479917"
      },
      {
        "category": "external",
        "summary": "1479920",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479920"
      },
      {
        "category": "external",
        "summary": "1479922",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479922"
      },
      {
        "category": "external",
        "summary": "1479923",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479923"
      },
      {
        "category": "external",
        "summary": "1479924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479924"
      },
      {
        "category": "external",
        "summary": "1479925",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479925"
      },
      {
        "category": "external",
        "summary": "1479926",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479926"
      },
      {
        "category": "external",
        "summary": "1479927",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479927"
      },
      {
        "category": "external",
        "summary": "1479929",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479929"
      },
      {
        "category": "external",
        "summary": "1479931",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479931"
      },
      {
        "category": "external",
        "summary": "1479935",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479935"
      },
      {
        "category": "external",
        "summary": "1479937",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479937"
      },
      {
        "category": "external",
        "summary": "1479938",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479938"
      },
      {
        "category": "external",
        "summary": "1479941",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479941"
      },
      {
        "category": "external",
        "summary": "1479943",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479943"
      },
      {
        "category": "external",
        "summary": "1479944",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479944"
      },
      {
        "category": "external",
        "summary": "1479959",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479959"
      },
      {
        "category": "external",
        "summary": "1479972",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479972"
      },
      {
        "category": "external",
        "summary": "1479976",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479976"
      },
      {
        "category": "external",
        "summary": "1479978",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479978"
      },
      {
        "category": "external",
        "summary": "1479991",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479991"
      },
      {
        "category": "external",
        "summary": "1479993",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479993"
      },
      {
        "category": "external",
        "summary": "1479994",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479994"
      },
      {
        "category": "external",
        "summary": "1480000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480000"
      },
      {
        "category": "external",
        "summary": "1480001",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480001"
      },
      {
        "category": "external",
        "summary": "1480002",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480002"
      },
      {
        "category": "external",
        "summary": "1480007",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480007"
      },
      {
        "category": "external",
        "summary": "1480008",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480008"
      },
      {
        "category": "external",
        "summary": "1480286",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480286"
      },
      {
        "category": "external",
        "summary": "1480377",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480377"
      },
      {
        "category": "external",
        "summary": "1480586",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480586"
      },
      {
        "category": "external",
        "summary": "1480588",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480588"
      },
      {
        "category": "external",
        "summary": "1480589",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480589"
      },
      {
        "category": "external",
        "summary": "1480654",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480654"
      },
      {
        "category": "external",
        "summary": "1480734",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480734"
      },
      {
        "category": "external",
        "summary": "1481296",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481296"
      },
      {
        "category": "external",
        "summary": "1481436",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481436"
      },
      {
        "category": "external",
        "summary": "1481437",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481437"
      },
      {
        "category": "external",
        "summary": "1481439",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481439"
      },
      {
        "category": "external",
        "summary": "1481442",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481442"
      },
      {
        "category": "external",
        "summary": "1481445",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481445"
      },
      {
        "category": "external",
        "summary": "1481449",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481449"
      },
      {
        "category": "external",
        "summary": "1481450",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481450"
      },
      {
        "category": "external",
        "summary": "1481845",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481845"
      },
      {
        "category": "external",
        "summary": "1481846",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481846"
      },
      {
        "category": "external",
        "summary": "1481849",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481849"
      },
      {
        "category": "external",
        "summary": "1481851",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481851"
      },
      {
        "category": "external",
        "summary": "1481853",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481853"
      },
      {
        "category": "external",
        "summary": "1482131",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482131"
      },
      {
        "category": "external",
        "summary": "1482136",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482136"
      },
      {
        "category": "external",
        "summary": "1482148",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482148"
      },
      {
        "category": "external",
        "summary": "1482170",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482170"
      },
      {
        "category": "external",
        "summary": "1482666",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482666"
      },
      {
        "category": "external",
        "summary": "1482667",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482667"
      },
      {
        "category": "external",
        "summary": "1482668",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482668"
      },
      {
        "category": "external",
        "summary": "1482669",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482669"
      },
      {
        "category": "external",
        "summary": "1482670",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482670"
      },
      {
        "category": "external",
        "summary": "1484373",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484373"
      },
      {
        "category": "external",
        "summary": "1484374",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484374"
      },
      {
        "category": "external",
        "summary": "1484385",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484385"
      },
      {
        "category": "external",
        "summary": "1484424",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484424"
      },
      {
        "category": "external",
        "summary": "1484539",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484539"
      },
      {
        "category": "external",
        "summary": "1484548",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484548"
      },
      {
        "category": "external",
        "summary": "1484608",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484608"
      },
      {
        "category": "external",
        "summary": "1484613",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484613"
      },
      {
        "category": "external",
        "summary": "1484895",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484895"
      },
      {
        "category": "external",
        "summary": "1484901",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484901"
      },
      {
        "category": "external",
        "summary": "1484904",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484904"
      },
      {
        "category": "external",
        "summary": "1484956",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484956"
      },
      {
        "category": "external",
        "summary": "1484984",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484984"
      },
      {
        "category": "external",
        "summary": "1485474",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1485474"
      },
      {
        "category": "external",
        "summary": "1486351",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486351"
      },
      {
        "category": "external",
        "summary": "1486474",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486474"
      },
      {
        "category": "external",
        "summary": "1487283",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487283"
      },
      {
        "category": "external",
        "summary": "1487320",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487320"
      },
      {
        "category": "external",
        "summary": "1487689",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487689"
      },
      {
        "category": "external",
        "summary": "1488967",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488967"
      },
      {
        "category": "external",
        "summary": "1489974",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489974"
      },
      {
        "category": "external",
        "summary": "1491310",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1491310"
      },
      {
        "category": "external",
        "summary": "1492840",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1492840"
      },
      {
        "category": "external",
        "summary": "1493207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493207"
      },
      {
        "category": "external",
        "summary": "1494561",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494561"
      },
      {
        "category": "external",
        "summary": "1496912",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1496912"
      },
      {
        "category": "external",
        "summary": "1496946",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1496946"
      },
      {
        "category": "external",
        "summary": "1497746",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1497746"
      },
      {
        "category": "external",
        "summary": "1497817",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1497817"
      },
      {
        "category": "external",
        "summary": "1497835",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1497835"
      },
      {
        "category": "external",
        "summary": "1498230",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1498230"
      },
      {
        "category": "external",
        "summary": "1498556",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1498556"
      },
      {
        "category": "external",
        "summary": "1499868",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1499868"
      },
      {
        "category": "external",
        "summary": "1500049",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500049"
      },
      {
        "category": "external",
        "summary": "1500051",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500051"
      },
      {
        "category": "external",
        "summary": "1500053",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500053"
      },
      {
        "category": "external",
        "summary": "1502738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502738"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3005.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat CloudForms security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-22T11:17:24+00:00",
      "generator": {
        "date": "2024-11-22T11:17:24+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2017:3005",
      "initial_release_date": "2017-10-24T00:15:49+00:00",
      "revision_history": [
        {
          "date": "2017-10-24T00:15:49+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-10-24T00:15:49+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T11:17:24+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "CloudForms Management Engine 5.8",
                "product": {
                  "name": "CloudForms Management Engine 5.8",
                  "product_id": "7Server-RH7-CFME-5.8",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.8::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat CloudForms"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ansible-tower-server-0:3.1.5-1.el7at.x86_64",
                "product": {
                  "name": "ansible-tower-server-0:3.1.5-1.el7at.x86_64",
                  "product_id": "ansible-tower-server-0:3.1.5-1.el7at.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ansible-tower-server@3.1.5-1.el7at?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
                "product": {
                  "name": "ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
                  "product_id": "ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ansible-tower-setup@3.1.5-1.el7at?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
                "product": {
                  "name": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
                  "product_id": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-nokogiri@1.8.1-2.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
                "product": {
                  "name": "rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
                  "product_id": "rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-nokogiri-debuginfo@1.8.1-2.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
                "product": {
                  "name": "rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
                  "product_id": "rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-nokogiri-doc@1.8.1-2.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-0:5.8.2.3-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-0:5.8.2.3-1.el7cf.x86_64",
                  "product_id": "cfme-0:5.8.2.3-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme@5.8.2.3-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
                  "product_id": "cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-debuginfo@5.8.2.3-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
                  "product_id": "cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-appliance@5.8.2.3-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
                  "product_id": "cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-appliance-debuginfo@5.8.2.3-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
                  "product_id": "cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-gemset@5.8.2.3-1.el7cf?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "supervisor-0:3.1.4-1.el7.src",
                "product": {
                  "name": "supervisor-0:3.1.4-1.el7.src",
                  "product_id": "supervisor-0:3.1.4-1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/supervisor@3.1.4-1.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rabbitmq-server-0:3.6.9-1.el7at.src",
                "product": {
                  "name": "rabbitmq-server-0:3.6.9-1.el7at.src",
                  "product_id": "rabbitmq-server-0:3.6.9-1.el7at.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rabbitmq-server@3.6.9-1.el7at?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
                "product": {
                  "name": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
                  "product_id": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-nokogiri@1.8.1-2.el7cf?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-0:5.8.2.3-1.el7cf.src",
                "product": {
                  "name": "cfme-0:5.8.2.3-1.el7cf.src",
                  "product_id": "cfme-0:5.8.2.3-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme@5.8.2.3-1.el7cf?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-appliance-0:5.8.2.3-1.el7cf.src",
                "product": {
                  "name": "cfme-appliance-0:5.8.2.3-1.el7cf.src",
                  "product_id": "cfme-appliance-0:5.8.2.3-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-appliance@5.8.2.3-1.el7cf?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-gemset-0:5.8.2.3-1.el7cf.src",
                "product": {
                  "name": "cfme-gemset-0:5.8.2.3-1.el7cf.src",
                  "product_id": "cfme-gemset-0:5.8.2.3-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-gemset@5.8.2.3-1.el7cf?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "supervisor-0:3.1.4-1.el7.noarch",
                "product": {
                  "name": "supervisor-0:3.1.4-1.el7.noarch",
                  "product_id": "supervisor-0:3.1.4-1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/supervisor@3.1.4-1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rabbitmq-server-0:3.6.9-1.el7at.noarch",
                "product": {
                  "name": "rabbitmq-server-0:3.6.9-1.el7at.noarch",
                  "product_id": "rabbitmq-server-0:3.6.9-1.el7at.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rabbitmq-server@3.6.9-1.el7at?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ansible-tower-server-0:3.1.5-1.el7at.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.5-1.el7at.x86_64"
        },
        "product_reference": "ansible-tower-server-0:3.1.5-1.el7at.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ansible-tower-setup-0:3.1.5-1.el7at.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.5-1.el7at.x86_64"
        },
        "product_reference": "ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-0:5.8.2.3-1.el7cf.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.src"
        },
        "product_reference": "cfme-0:5.8.2.3-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-0:5.8.2.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.x86_64"
        },
        "product_reference": "cfme-0:5.8.2.3-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-appliance-0:5.8.2.3-1.el7cf.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.src"
        },
        "product_reference": "cfme-appliance-0:5.8.2.3-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-appliance-0:5.8.2.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.x86_64"
        },
        "product_reference": "cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64"
        },
        "product_reference": "cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64"
        },
        "product_reference": "cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-gemset-0:5.8.2.3-1.el7cf.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.src"
        },
        "product_reference": "cfme-gemset-0:5.8.2.3-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-gemset-0:5.8.2.3-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.x86_64"
        },
        "product_reference": "cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rabbitmq-server-0:3.6.9-1.el7at.noarch as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.noarch"
        },
        "product_reference": "rabbitmq-server-0:3.6.9-1.el7at.noarch",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rabbitmq-server-0:3.6.9-1.el7at.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.src"
        },
        "product_reference": "rabbitmq-server-0:3.6.9-1.el7at.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src"
        },
        "product_reference": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64"
        },
        "product_reference": "rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64"
        },
        "product_reference": "rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64"
        },
        "product_reference": "rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "supervisor-0:3.1.4-1.el7.noarch as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.noarch"
        },
        "product_reference": "supervisor-0:3.1.4-1.el7.noarch",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "supervisor-0:3.1.4-1.el7.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.src"
        },
        "product_reference": "supervisor-0:3.1.4-1.el7.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-11610",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "discovery_date": "2017-07-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1476143"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the XML-RPC interface in supervisord. When processing malformed commands, an attacker can cause arbitrary shell commands to be executed on the server as the same user as supervisord. Exploitation requires the attacker to first be authenticated to the supervisord service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "supervisor: Command injection via malicious XML-RPC request",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.5-1.el7at.x86_64",
          "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
          "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.noarch",
          "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.src",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.noarch",
          "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-11610"
        },
        {
          "category": "external",
          "summary": "RHBZ#1476143",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1476143"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-11610",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-11610"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-11610",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11610"
        }
      ],
      "release_date": "2017-07-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-10-24T00:15:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.noarch",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.noarch",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3005"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.noarch",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.noarch",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "supervisor: Command injection via malicious XML-RPC request"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Ryan Petrello"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2017-12148",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2017-08-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1485474"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Tower\u0027s interface with SCM repositories. If a Tower project (SCM repository) definition does not have the \u0027delete before update\u0027 flag set, an attacker with commit access to the upstream playbook source repository could create a Trojan playbook that, when executed by Tower, modifies the checked out SCM repository to add git hooks. These git hooks could, in turn, cause arbitrary command and code execution as the user Tower runs as.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Tower: modification of git hooks in SCM repo via upstream playbook execution",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.5-1.el7at.x86_64",
          "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
          "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.noarch",
          "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.src",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.noarch",
          "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-12148"
        },
        {
          "category": "external",
          "summary": "RHBZ#1485474",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1485474"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12148",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-12148"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12148",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12148"
        }
      ],
      "release_date": "2017-09-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-10-24T00:15:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.noarch",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.noarch",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3005"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.5-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.2.3-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.noarch",
            "7Server-RH7-CFME-5.8:rabbitmq-server-0:3.6.9-1.el7at.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-debuginfo-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-nokogiri-doc-0:1.8.1-2.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.noarch",
            "7Server-RH7-CFME-5.8:supervisor-0:3.1.4-1.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "Tower: modification of git hooks in SCM repo via upstream playbook execution"
    }
  ]
}
  CERTFR-2019-AVI-014
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Centreon | Web | SRC Series Application Server et Web Administrator versions antérieures à 4.12.0-R1 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 sur vMX Series | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53, 15.1, 15.1X53, 16.1, 17.1, 17.2, 17.3, 17.4, 18.1 sur EX2300/EX3400, EX2300/EX3400 series, EX4600, QFX3K series, QFX5200/QFX5110 series et QFX5k series | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53, 15.1, 15.1X53 sur EX Virtual Chassis Platforms, MX Virtual Chassis Platforms et QFX Virtual Chassis Platforms | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46, 12.3, 12.3X48, 14.1X53, 15.1, 15.1F, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.2X75, 17.3, 17.4, 18.1, 18.2 et 18.2X75 | ||
| N/A | N/A | Juniper ATP | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53, 18.1, 18.2 sur EX2300 et EX3400 series | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2 sur MX Series | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48, 15.1X49, 17.3, 17.4, 18.1 et 18.2 sur SRX Series | ||
| Juniper Networks | Junos Space | Junos Space | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46, 12.3X48, 15.1X49 sur SRX Series | ||
| Juniper Networks | Junos OS | Tous produits et toutes plateformes exécutant Junos OS | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2X75, 17.4, 18.1 et 18.2 sur QFX et PTX Series | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SRC Series Application Server et Web Administrator versions ant\u00e9rieures \u00e0 4.12.0-R1",
      "product": {
        "name": "Web",
        "vendor": {
          "name": "Centreon",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1 sur vMX Series",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 14.1X53, 15.1, 15.1X53, 16.1, 17.1, 17.2, 17.3, 17.4, 18.1 sur EX2300/EX3400, EX2300/EX3400 series, EX4600, QFX3K series, QFX5200/QFX5110 series et QFX5k series",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 14.1X53, 15.1, 15.1X53 sur EX Virtual Chassis Platforms, MX Virtual Chassis Platforms et QFX Virtual Chassis Platforms",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 12.1X46, 12.3, 12.3X48, 14.1X53, 15.1, 15.1F, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.2X75, 17.3, 17.4, 18.1, 18.2 et 18.2X75",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Juniper ATP",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1X53, 18.1, 18.2 sur EX2300 et EX3400 series",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2 sur MX Series",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 12.3X48, 15.1X49, 17.3, 17.4, 18.1 et 18.2 sur SRX Series",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos Space",
      "product": {
        "name": "Junos Space",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 12.1X46, 12.3X48, 15.1X49 sur SRX Series",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Tous produits et toutes plateformes ex\u00e9cutant Junos OS",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 17.2X75, 17.4, 18.1 et 18.2 sur QFX et PTX Series",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2019-0010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0010"
    },
    {
      "name": "CVE-2018-10901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-10901"
    },
    {
      "name": "CVE-2018-0737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
    },
    {
      "name": "CVE-2017-18258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
    },
    {
      "name": "CVE-2018-5683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
    },
    {
      "name": "CVE-2019-0003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0003"
    },
    {
      "name": "CVE-2019-0007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0007"
    },
    {
      "name": "CVE-2018-5391",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-5391"
    },
    {
      "name": "CVE-2017-13672",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
    },
    {
      "name": "CVE-2017-0861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-0861"
    },
    {
      "name": "CVE-2018-7566",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-7566"
    },
    {
      "name": "CVE-2019-0027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0027"
    },
    {
      "name": "CVE-2019-0030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0030"
    },
    {
      "name": "CVE-2017-1000379",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000379"
    },
    {
      "name": "CVE-2019-0001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0001"
    },
    {
      "name": "CVE-2018-14634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-14634"
    },
    {
      "name": "CVE-2019-0002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0002"
    },
    {
      "name": "CVE-2019-0013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0013"
    },
    {
      "name": "CVE-2019-0023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0023"
    },
    {
      "name": "CVE-2016-4447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
    },
    {
      "name": "CVE-2018-10675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-10675"
    },
    {
      "name": "CVE-2016-4448",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
    },
    {
      "name": "CVE-2017-3137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3137"
    },
    {
      "name": "CVE-2015-1283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-1283"
    },
    {
      "name": "CVE-2016-3705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-3705"
    },
    {
      "name": "CVE-2017-3142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3142"
    },
    {
      "name": "CVE-2018-10872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-10872"
    },
    {
      "name": "CVE-2019-0015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0015"
    },
    {
      "name": "CVE-2019-0005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0005"
    },
    {
      "name": "CVE-2019-0009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0009"
    },
    {
      "name": "CVE-2018-7858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
    },
    {
      "name": "CVE-2019-0024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0024"
    },
    {
      "name": "CVE-2019-0025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0025"
    },
    {
      "name": "CVE-2017-3143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3143"
    },
    {
      "name": "CVE-2018-3620",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
    },
    {
      "name": "CVE-2017-7375",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
    },
    {
      "name": "CVE-2019-0011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0011"
    },
    {
      "name": "CVE-2018-3639",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
    },
    {
      "name": "CVE-2017-15265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-15265"
    },
    {
      "name": "CVE-2019-0012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0012"
    },
    {
      "name": "CVE-2017-11610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11610"
    },
    {
      "name": "CVE-2018-5748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-5748"
    },
    {
      "name": "CVE-2019-0004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0004"
    },
    {
      "name": "CVE-2019-0017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0017"
    },
    {
      "name": "CVE-2018-1126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
    },
    {
      "name": "CVE-2018-3665",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
    },
    {
      "name": "CVE-2017-1000366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000366"
    },
    {
      "name": "CVE-2016-3627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
    },
    {
      "name": "CVE-2018-12020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12020"
    },
    {
      "name": "CVE-2018-5390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390"
    },
    {
      "name": "CVE-2016-2183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
    },
    {
      "name": "CVE-2018-12384",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
    },
    {
      "name": "CVE-2018-10897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
    },
    {
      "name": "CVE-2019-0021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0021"
    },
    {
      "name": "CVE-2018-9251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-9251"
    },
    {
      "name": "CVE-2019-0016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0016"
    },
    {
      "name": "CVE-2018-1124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
    },
    {
      "name": "CVE-2018-8897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897"
    },
    {
      "name": "CVE-2019-0022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0022"
    },
    {
      "name": "CVE-2017-1000364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000364"
    },
    {
      "name": "CVE-2018-0732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
    },
    {
      "name": "CVE-2018-1050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1050"
    },
    {
      "name": "CVE-2019-0014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0014"
    },
    {
      "name": "CVE-2018-3693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3693"
    },
    {
      "name": "CVE-2018-10911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-10911"
    },
    {
      "name": "CVE-2019-0026",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0026"
    },
    {
      "name": "CVE-2019-0029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0029"
    },
    {
      "name": "CVE-2019-0020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0020"
    },
    {
      "name": "CVE-2018-5740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-5740"
    },
    {
      "name": "CVE-2017-2619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-2619"
    },
    {
      "name": "CVE-2019-0018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0018"
    },
    {
      "name": "CVE-2018-1000004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
    },
    {
      "name": "CVE-2019-0006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0006"
    },
    {
      "name": "CVE-2016-4449",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
    },
    {
      "name": "CVE-2017-3136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3136"
    },
    {
      "name": "CVE-2011-3389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
    },
    {
      "name": "CVE-2017-3145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3145"
    },
    {
      "name": "CVE-2018-1064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
    },
    {
      "name": "CVE-2018-10301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-10301"
    }
  ],
  "initial_release_date": "2019-01-10T00:00:00",
  "last_revision_date": "2019-01-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2019-AVI-014",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2019-01-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10906 du 9 janvier 2019",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10906\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10910 du 9 janvier 2019",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10910\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10911 du 9 janvier 2019",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10911\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10907 du 9 janvier 2019",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10907\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10912 du 9 janvier 2019",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10912\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10913 du 9 janvier 2019",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10913\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10919 du 9 janvier 2019",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10919\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10905 du 9 janvier 2019",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10905\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10902 du 9 janvier 2019",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10902\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10917 du 9 janvier 2019",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10917\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10904 du 9 janvier 2019",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10904\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10915 du 9 janvier 2019",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10915\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10916 du 9 janvier 2019",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10916\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10914 du 9 janvier 2019",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10914\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10900 du 9 janvier 2019",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10900\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10909 du 9 janvier 2019",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10909\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10901 du 9 janvier 2019",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10901\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10918 du 9 janvier 2019",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10918\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10903 du 9 janvier 2019",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10903\u0026cat=SIRT_1\u0026actp=LIST"
    }
  ]
}
  pysec-2017-41
Vulnerability from pysec
The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups.
| Name | purl | supervisor | pkg:pypi/supervisor | 
|---|
{
  "affected": [
    {
      "package": {
        "ecosystem": "PyPI",
        "name": "supervisor",
        "purl": "pkg:pypi/supervisor"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "3.0.1"
            },
            {
              "introduced": "3.1"
            },
            {
              "fixed": "3.1.4"
            },
            {
              "introduced": "3.2"
            },
            {
              "fixed": "3.2.4"
            },
            {
              "introduced": "3.3"
            },
            {
              "fixed": "3.3.3"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ],
      "versions": [
        "2.0",
        "2.0b1",
        "2.1",
        "2.1b1",
        "2.2b1",
        "3.0",
        "3.0a1",
        "3.0a10",
        "3.0a11",
        "3.0a12",
        "3.0a2",
        "3.0a3",
        "3.0a4",
        "3.0a5",
        "3.0a6",
        "3.0a7",
        "3.0a8",
        "3.0a9",
        "3.0b1",
        "3.0b2",
        "3.1.0",
        "3.1.1",
        "3.1.2",
        "3.1.3",
        "3.2.0",
        "3.2.1",
        "3.2.2",
        "3.2.3",
        "3.3.0",
        "3.3.1",
        "3.3.2",
        "a3"
      ]
    }
  ],
  "aliases": [
    "CVE-2017-11610",
    "GHSA-x7c8-4x3h-874w"
  ],
  "details": "The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups.",
  "id": "PYSEC-2017-41",
  "modified": "2021-07-05T00:01:27.197995Z",
  "published": "2017-08-23T14:29:00Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/"
    },
    {
      "type": "WEB",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/"
    },
    {
      "type": "WEB",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B/"
    },
    {
      "type": "REPORT",
      "url": "https://github.com/Supervisor/supervisor/issues/964"
    },
    {
      "type": "WEB",
      "url": "https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt"
    },
    {
      "type": "WEB",
      "url": "https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt"
    },
    {
      "type": "WEB",
      "url": "https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt"
    },
    {
      "type": "WEB",
      "url": "https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt"
    },
    {
      "type": "ADVISORY",
      "url": "http://www.debian.org/security/2017/dsa-3942"
    },
    {
      "type": "ADVISORY",
      "url": "https://security.gentoo.org/glsa/201709-06"
    },
    {
      "type": "WEB",
      "url": "https://www.exploit-db.com/exploits/42779/"
    },
    {
      "type": "ADVISORY",
      "url": "https://access.redhat.com/errata/RHSA-2017:3005"
    },
    {
      "type": "ADVISORY",
      "url": "https://github.com/advisories/GHSA-x7c8-4x3h-874w"
    }
  ]
}
  ghsa-x7c8-4x3h-874w
Vulnerability from github
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups.
{
  "affected": [
    {
      "package": {
        "ecosystem": "PyPI",
        "name": "supervisor"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "3.0.1"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "PyPI",
        "name": "supervisor"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "3.1.0"
            },
            {
              "fixed": "3.1.4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "PyPI",
        "name": "supervisor"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "3.2.0"
            },
            {
              "fixed": "3.2.4"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "PyPI",
        "name": "supervisor"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "3.3.0"
            },
            {
              "fixed": "3.3.3"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2017-11610"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-276"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2022-07-01T21:43:13Z",
    "nvd_published_at": "2017-08-23T14:29:00Z",
    "severity": "HIGH"
  },
  "details": "The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups.",
  "id": "GHSA-x7c8-4x3h-874w",
  "modified": "2024-10-28T14:26:55Z",
  "published": "2022-05-13T01:42:26Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11610"
    },
    {
      "type": "WEB",
      "url": "https://github.com/Supervisor/supervisor/issues/964"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2017:3005"
    },
    {
      "type": "WEB",
      "url": "https://github.com/Supervisor/supervisor"
    },
    {
      "type": "WEB",
      "url": "https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt"
    },
    {
      "type": "WEB",
      "url": "https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt"
    },
    {
      "type": "WEB",
      "url": "https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt"
    },
    {
      "type": "WEB",
      "url": "https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt"
    },
    {
      "type": "ADVISORY",
      "url": "https://github.com/advisories/GHSA-x7c8-4x3h-874w"
    },
    {
      "type": "WEB",
      "url": "https://github.com/pypa/advisory-database/tree/main/vulns/supervisor/PYSEC-2017-41.yaml"
    },
    {
      "type": "WEB",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B"
    },
    {
      "type": "WEB",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM"
    },
    {
      "type": "WEB",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ"
    },
    {
      "type": "WEB",
      "url": "https://security.gentoo.org/glsa/201709-06"
    },
    {
      "type": "WEB",
      "url": "https://www.exploit-db.com/exploits/42779"
    },
    {
      "type": "WEB",
      "url": "http://www.debian.org/security/2017/dsa-3942"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    },
    {
      "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
      "type": "CVSS_V4"
    }
  ],
  "summary": "Incorrect Default Permissions in Supervisor"
}
  fkie_cve-2017-11610
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.debian.org/security/2017/dsa-3942 | Third Party Advisory | |
| cve@mitre.org | https://access.redhat.com/errata/RHSA-2017:3005 | Third Party Advisory | |
| cve@mitre.org | https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt | Release Notes, Vendor Advisory | |
| cve@mitre.org | https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt | Release Notes, Vendor Advisory | |
| cve@mitre.org | https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt | Release Notes, Vendor Advisory | |
| cve@mitre.org | https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt | Release Notes, Vendor Advisory | |
| cve@mitre.org | https://github.com/Supervisor/supervisor/issues/964 | Issue Tracking, Vendor Advisory | |
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/ | ||
| cve@mitre.org | https://security.gentoo.org/glsa/201709-06 | Third Party Advisory | |
| cve@mitre.org | https://www.exploit-db.com/exploits/42779/ | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2017/dsa-3942 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:3005 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Supervisor/supervisor/issues/964 | Issue Tracking, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201709-06 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/42779/ | Exploit, Third Party Advisory, VDB Entry | 
| Vendor | Product | Version | |
|---|---|---|---|
| supervisord | supervisor | * | |
| supervisord | supervisor | 3.1.0 | |
| supervisord | supervisor | 3.1.1 | |
| supervisord | supervisor | 3.1.2 | |
| supervisord | supervisor | 3.1.3 | |
| supervisord | supervisor | 3.2.0 | |
| supervisord | supervisor | 3.2.1 | |
| supervisord | supervisor | 3.2.2 | |
| supervisord | supervisor | 3.2.3 | |
| supervisord | supervisor | 3.3.0 | |
| supervisord | supervisor | 3.3.1 | |
| supervisord | supervisor | 3.3.2 | |
| fedoraproject | fedora | 24 | |
| fedoraproject | fedora | 25 | |
| fedoraproject | fedora | 26 | |
| debian | debian_linux | 8.0 | |
| debian | debian_linux | 9.0 | |
| redhat | cloudforms | 4.5 | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:supervisord:supervisor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF8843B0-023D-4D38-B8A6-0082DA076EB0",
              "versionEndIncluding": "3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:supervisord:supervisor:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F7331EA-43A4-4B66-A2C8-9F9677CDF199",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:supervisord:supervisor:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "873339F6-2F2F-4FCA-850B-AFBB869FAE49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:supervisord:supervisor:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB8C540A-EFA9-41E3-B80A-B5D1DC002BF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:supervisord:supervisor:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F9FCD82-05D1-4AE0-B5F4-83C70D34B3C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:supervisord:supervisor:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEBADED9-ABB4-4D28-916E-71A005781756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:supervisord:supervisor:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A70602-4024-4EB4-BC9D-9AA65E3DC3FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:supervisord:supervisor:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "164F8D14-DC0E-4F60-B3E9-E4BB7BC859DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:supervisord:supervisor:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FACD9C65-805C-42B8-970F-71086029EC3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:supervisord:supervisor:3.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "73D1DFCA-8289-41C7-A11A-5B5BFA6BA493",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:supervisord:supervisor:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9C1E9BA-5D9E-407F-80DE-E3C7886F8FD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:supervisord:supervisor:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4642C276-6F33-4FC8-80FB-512310366D30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*",
              "matchCriteriaId": "C729D5D1-ED95-443A-9F53-5D7C2FD9B80C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*",
              "matchCriteriaId": "772E9557-A371-4664-AE2D-4135AAEB89AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E4D8269-B407-4C24-AAB0-02F885C7D752",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:cloudforms:4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "32E1BA91-4695-4E64-A9D7-4A6CB6904D41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups."
    },
    {
      "lang": "es",
      "value": "El servidor XML-RPC en supervisor en versiones anteriores a la 3.0.1, 3.1.x en versiones anteriores a la 3.1.4, 3.2.x en versiones anteriores a la 3.2.4, y 3.3.x en versiones anteriores a la 3.3.3 permite que atacantes remotos autenticados ejecuten comandos arbitrarios mediante una petici\u00f3n XML-RPC, relacionada con b\u00fasquedas de espacio de nombres supervisor anidados."
    }
  ],
  "id": "CVE-2017-11610",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-08-23T14:29:00.237",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2017/dsa-3942"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3005"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://github.com/Supervisor/supervisor/issues/964"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201709-06"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/42779/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2017/dsa-3942"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://github.com/Supervisor/supervisor/issues/964"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201709-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/42779/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  cnvd-2017-26163
Vulnerability from cnvd
厂商已发布漏洞修复程序,请及时关注更新: https://github.com/Supervisor/supervisor/issues/964
| Name | ['Supervisor supervisor <3.0.1', 'Supervisor supervisor 3.1.*,<3.1.4', 'Supervisor supervisor 3.2.*,<3.2.4', 'Supervisor supervisor 3.3.*,<3.3.3'] | 
|---|
{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2017-11610"
    }
  },
  "description": "Supervisor\u662f\u4e00\u4e2aPython\u5f00\u53d1\u7684client/server\u7cfb\u7edf\uff0c\u53ef\u4ee5\u7ba1\u7406\u548c\u76d1\u63a7\u7c7bUNIX\u64cd\u4f5c\u7cfb\u7edf\u4e0a\u9762\u7684\u8fdb\u7a0b\u3002\u5b83\u53ef\u4ee5\u540c\u65f6\u542f\u52a8\uff0c\u5173\u95ed\u591a\u4e2a\u8fdb\u7a0b\u3002\r\n\r\nSupervisor\u5b58\u5728\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e\u3002\u5141\u8bb8\u8fdc\u7a0b\u7528\u6237\u901a\u8fc7\u4e00\u4e2a\u7279\u5236\u7684XML-RPC\u8bf7\u6c42\u6267\u884c\u4efb\u610f\u547d\u3002",
  "discovererName": "Calum Hutton",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://github.com/Supervisor/supervisor/issues/964",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-26163",
  "openTime": "2017-09-11",
  "products": {
    "product": [
      "Supervisor supervisor \u003c3.0.1",
      "Supervisor supervisor  3.1.*\uff0c\u003c3.1.4",
      "Supervisor supervisor  3.2.*\uff0c\u003c3.2.4",
      "Supervisor supervisor  3.3.*\uff0c\u003c3.3.3"
    ]
  },
  "referenceLink": "https://blogs.securiteam.com/index.php/archives/3348\r\nhttps://github.com/Supervisor/supervisor\r\nhttps://www.seebug.org/vuldb/ssvid-96316",
  "serverity": "\u9ad8",
  "submitTime": "2017-07-28",
  "title": "Supervisor\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e"
}
  gsd-2017-11610
Vulnerability from gsd
{
  "GSD": {
    "alias": "CVE-2017-11610",
    "description": "The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups.",
    "id": "GSD-2017-11610",
    "references": [
      "https://www.suse.com/security/cve/CVE-2017-11610.html",
      "https://www.debian.org/security/2017/dsa-3942",
      "https://access.redhat.com/errata/RHSA-2017:3005",
      "https://advisories.mageia.org/CVE-2017-11610.html",
      "https://packetstormsecurity.com/files/cve/CVE-2017-11610"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2017-11610"
      ],
      "details": "The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups.",
      "id": "GSD-2017-11610",
      "modified": "2023-12-13T01:21:15.487184Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "cve@mitre.org",
        "ID": "CVE-2017-11610",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "RHSA-2017:3005",
            "refsource": "REDHAT",
            "url": "https://access.redhat.com/errata/RHSA-2017:3005"
          },
          {
            "name": "https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt",
            "refsource": "CONFIRM",
            "url": "https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt"
          },
          {
            "name": "https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt",
            "refsource": "CONFIRM",
            "url": "https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt"
          },
          {
            "name": "https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt",
            "refsource": "CONFIRM",
            "url": "https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt"
          },
          {
            "name": "FEDORA-2017-307eab89e1",
            "refsource": "FEDORA",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B/"
          },
          {
            "name": "FEDORA-2017-85eb9f7a36",
            "refsource": "FEDORA",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/"
          },
          {
            "name": "https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt",
            "refsource": "CONFIRM",
            "url": "https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt"
          },
          {
            "name": "FEDORA-2017-713430fb15",
            "refsource": "FEDORA",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/"
          },
          {
            "name": "DSA-3942",
            "refsource": "DEBIAN",
            "url": "http://www.debian.org/security/2017/dsa-3942"
          },
          {
            "name": "https://github.com/Supervisor/supervisor/issues/964",
            "refsource": "CONFIRM",
            "url": "https://github.com/Supervisor/supervisor/issues/964"
          },
          {
            "name": "42779",
            "refsource": "EXPLOIT-DB",
            "url": "https://www.exploit-db.com/exploits/42779/"
          },
          {
            "name": "GLSA-201709-06",
            "refsource": "GENTOO",
            "url": "https://security.gentoo.org/glsa/201709-06"
          }
        ]
      }
    },
    "gitlab.com": {
      "advisories": [
        {
          "affected_range": "\u003c=3.1.3||\u003e=3.2.0,\u003c=3.2.3||\u003e=3.3.0,\u003c=3.3.2",
          "affected_versions": "All versions up to 3.1.3, all versions starting from 3.2.0 up to 3.2.3, all versions starting from 3.3.0 up to 3.3.2",
          "cvss_v2": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "cwe_ids": [
            "CWE-1035",
            "CWE-276",
            "CWE-937"
          ],
          "date": "2019-10-03",
          "description": "The XML-RPC server in supervis allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups.",
          "fixed_versions": [
            "3.1.4",
            "3.2.4",
            "3.3.3"
          ],
          "identifier": "CVE-2017-11610",
          "identifiers": [
            "CVE-2017-11610"
          ],
          "not_impacted": "All versions after 3.1.3 before 3.2.0, all versions after 3.2.3 before 3.3.0, all versions after 3.3.2",
          "package_slug": "pypi/supervisor",
          "pubdate": "2017-08-23",
          "solution": "Upgrade to versions 3.1.4, 3.2.4, 3.3.3 or above.",
          "title": "Incorrect Default Permissions",
          "urls": [
            "https://nvd.nist.gov/vuln/detail/CVE-2017-11610",
            "https://www.exploit-db.com/exploits/42779/"
          ],
          "uuid": "9135b156-ef5c-4912-9244-81ec7fa55cfc"
        }
      ]
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:supervisord:supervisor:3.3.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:supervisord:supervisor:3.3.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:supervisord:supervisor:3.3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:supervisord:supervisor:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "3.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:supervisord:supervisor:3.1.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:supervisord:supervisor:3.1.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:supervisord:supervisor:3.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:supervisord:supervisor:3.2.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:supervisord:supervisor:3.2.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:supervisord:supervisor:3.1.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:supervisord:supervisor:3.2.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:supervisord:supervisor:3.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:redhat:cloudforms:4.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-11610"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-276"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2017-713430fb15",
              "refsource": "FEDORA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/"
            },
            {
              "name": "FEDORA-2017-85eb9f7a36",
              "refsource": "FEDORA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/"
            },
            {
              "name": "FEDORA-2017-307eab89e1",
              "refsource": "FEDORA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B/"
            },
            {
              "name": "https://github.com/Supervisor/supervisor/issues/964",
              "refsource": "CONFIRM",
              "tags": [
                "Issue Tracking",
                "Vendor Advisory"
              ],
              "url": "https://github.com/Supervisor/supervisor/issues/964"
            },
            {
              "name": "https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt",
              "refsource": "CONFIRM",
              "tags": [
                "Release Notes",
                "Vendor Advisory"
              ],
              "url": "https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt"
            },
            {
              "name": "https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt",
              "refsource": "CONFIRM",
              "tags": [
                "Release Notes",
                "Vendor Advisory"
              ],
              "url": "https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt"
            },
            {
              "name": "https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt",
              "refsource": "CONFIRM",
              "tags": [
                "Release Notes",
                "Vendor Advisory"
              ],
              "url": "https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt"
            },
            {
              "name": "https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt",
              "refsource": "CONFIRM",
              "tags": [
                "Release Notes",
                "Vendor Advisory"
              ],
              "url": "https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt"
            },
            {
              "name": "DSA-3942",
              "refsource": "DEBIAN",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://www.debian.org/security/2017/dsa-3942"
            },
            {
              "name": "GLSA-201709-06",
              "refsource": "GENTOO",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://security.gentoo.org/glsa/201709-06"
            },
            {
              "name": "42779",
              "refsource": "EXPLOIT-DB",
              "tags": [
                "Exploit",
                "Third Party Advisory",
                "VDB Entry"
              ],
              "url": "https://www.exploit-db.com/exploits/42779/"
            },
            {
              "name": "RHSA-2017:3005",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/errata/RHSA-2017:3005"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "acInsufInfo": false,
          "cvssV2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          "exploitabilityScore": 8.0,
          "impactScore": 10.0,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "HIGH",
          "userInteractionRequired": false
        },
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "exploitabilityScore": 2.8,
          "impactScore": 5.9
        }
      },
      "lastModifiedDate": "2019-10-03T00:03Z",
      "publishedDate": "2017-08-23T14:29Z"
    }
  }
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
 - Confirmed: The vulnerability is confirmed from an analyst perspective.
 - Published Proof of Concept: A public proof of concept is available for this vulnerability.
 - Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
 - Patched: This vulnerability was successfully patched by the user reporting the sighting.
 - Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
 - Not confirmed: The user expresses doubt about the veracity of the vulnerability.
 - Not patched: This vulnerability was not successfully patched by the user reporting the sighting.