{"id":"CVE-2023-0462","details":"An arbitrary code execution flaw was found in Foreman. This issue may allow an admin user to execute arbitrary code on the underlying operating system by setting global parameters with a YAML payload.","modified":"2026-03-14T11:56:38.195926Z","published":"2023-09-20T14:15:12.990Z","references":[{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-0462"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162970"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/theforeman/smart-proxy","events":[{"introduced":"0"},{"fixed":"4fabeb7ee4e869aa3f96aa1f484ee6a714bda19d"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.8.0"}]}}],"versions":["0.1","0.2","0.2rc2","0.3","0.3.1","1.0","1.0RC1","1.0RC2","1.1","1.1RC1","1.1RC2","1.1RC3","3.8.0-rc1","3.8.0-rc2"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"6.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-0462.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}]}