Vulnerabilities > CVE-2020-10779 - Authorization Bypass Through User-Controlled Key vulnerability in Redhat Cloudforms 4.7/5.0.0
Attack vector
NETWORK Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
NONE Availability impact
NONE Summary
Red Hat CloudForms 4.7 and 5 leads to insecure direct object references (IDOR) and functional level access control bypass due to missing privilege check. Therefore, if an attacker knows the right criteria, it is possible to access some sensitive data within the CloudForms.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |