{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T00:03:01.693","vulnerabilities":[{"cve":{"id":"CVE-2021-3584","sourceIdentifier":"secalert@redhat.com","published":"2021-12-23T20:15:11.533","lastModified":"2024-11-21T06:21:54.377","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injection. The highest threat from this vulnerability is to confidentiality, integrity and availability of system. Fixed releases are 2.4.1, 2.5.1, 3.0.0."},{"lang":"es","value":"Se encontró una vulnerabilidad de ejecución de código remota del lado del servidor Foreman project. Un atacante autenticado podría usar las opciones de configuración de Sendmail para sobrescribir los valores predeterminados y llevar a cabo una inyección de comandos. La mayor amenaza de esta vulnerabilidad es para la confidencialidad, integridad y disponibilidad del sistema. Las versiones corregidas son 2.4.1, 2.5.1 y 3.0.0"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","baseScore":9.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:*","versionEndExcluding":"2.4.1","matchCriteriaId":"4A8CBA15-7710-462A-822C-3D7D92C717EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:*","versionStartIncluding":"2.5.0","versionEndExcluding":"2.5.1","matchCriteriaId":"DA86BC71-CC45-47B5-8364-A5D850C5DBD8"},{"vulnerable":true,"criteria":"cpe:2.3:a:theforeman:foreman:3.0.0:rc1:*:*:*:*:*:*","matchCriteriaId":"7BB531EC-9DDD-4228-BA5F-0F56FBFAD878"},{"vulnerable":true,"criteria":"cpe:2.3:a:theforeman:foreman:3.0.0:rc2:*:*:*:*:*:*","matchCriteriaId":"AAC25D55-5406-41B7-9439-E005875203C6"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:satellite:6.0:*:*:*:*:*:*:*","matchCriteriaId":"500C9E01-3373-43EA-AA9B-862B0DD87C6D"}]}]}],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1968439","source":"secalert@redhat.com","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https://github.com/theforeman/foreman/pull/8599","source":"secalert@redhat.com","tags":["Issue Tracking","Patch","Third Party Advisory"]},{"url":"https://projects.theforeman.org/issues/32753","source":"secalert@redhat.com","tags":["Issue Tracking","Patch","Vendor Advisory"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1968439","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https://github.com/theforeman/foreman/pull/8599","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch","Third Party Advisory"]},{"url":"https://projects.theforeman.org/issues/32753","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch","Vendor Advisory"]}]}}]}