User Impersonation Authorization Flaw in Red Hat CloudForms before 5.11.7.0

User Impersonation Authorization Flaw in Red Hat CloudForms before 5.11.7.0

CVE-2020-14325 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Red Hat CloudForms before 5.11.7.0 was vulnerable to the User Impersonation authorization flaw which allows malicious attacker to create existent and non-existent role-based access control user, with groups and roles. With a selected group of EvmGroup-super_administrator, an attacker can perform any API request as a super administrator.

Learn more about our Api Penetration Testing.