Show plain JSON{"affected_release": [{"advisory": "RHSA-2018:1972", "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.8::el7", "impact": "low", "package": "ansible-0:2.4.4.0-1.el7ae", "product_name": "CloudForms Management Engine 5.8", "release_date": "2018-06-25T00:00:00Z"}, {"advisory": "RHSA-2018:1972", "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.8::el7", "impact": "low", "package": "ansible-tower-0:3.1.7-1.el7at", "product_name": "CloudForms Management Engine 5.8", "release_date": "2018-06-25T00:00:00Z"}, {"advisory": "RHSA-2018:1972", "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.8::el7", "impact": "low", "package": "cfme-0:5.8.4.5-1.el7cf", "product_name": "CloudForms Management Engine 5.8", "release_date": "2018-06-25T00:00:00Z"}, {"advisory": "RHSA-2018:1972", "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.8::el7", "impact": "low", "package": "cfme-appliance-0:5.8.4.5-1.el7cf", "product_name": "CloudForms Management Engine 5.8", "release_date": "2018-06-25T00:00:00Z"}, {"advisory": "RHSA-2018:1972", "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.8::el7", "impact": "low", "package": "cfme-gemset-0:5.8.4.5-1.el7cf", "product_name": "CloudForms Management Engine 5.8", "release_date": "2018-06-25T00:00:00Z"}, {"advisory": "RHSA-2018:1972", "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.8::el7", "impact": "low", "package": "python-paramiko-0:2.1.1-4.el7", "product_name": "CloudForms Management Engine 5.8", "release_date": "2018-06-25T00:00:00Z"}, {"advisory": "RHSA-2018:1972", "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.8::el7", "impact": "low", "package": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf", "product_name": "CloudForms Management Engine 5.8", "release_date": "2018-06-25T00:00:00Z"}, {"advisory": "RHSA-2018:1328", "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.9::el7", "impact": "low", "package": "ansible-0:2.4.4.0-1.el7ae", "product_name": "CloudForms Management Engine 5.9", "release_date": "2018-05-07T00:00:00Z"}, {"advisory": "RHSA-2018:1328", "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.9::el7", "impact": "low", "package": "ansible-tower-0:3.2.4-1.el7at", "product_name": "CloudForms Management Engine 5.9", "release_date": "2018-05-07T00:00:00Z"}, {"advisory": "RHSA-2018:1328", "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.9::el7", "impact": "low", "package": "cfme-0:5.9.2.4-1.el7cf", "product_name": "CloudForms Management Engine 5.9", "release_date": "2018-05-07T00:00:00Z"}, {"advisory": "RHSA-2018:1328", "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.9::el7", "impact": "low", "package": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf", "product_name": "CloudForms Management Engine 5.9", "release_date": "2018-05-07T00:00:00Z"}, {"advisory": "RHSA-2018:1328", "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.9::el7", "impact": "low", "package": "cfme-appliance-0:5.9.2.4-1.el7cf", "product_name": "CloudForms Management Engine 5.9", "release_date": "2018-05-07T00:00:00Z"}, {"advisory": "RHSA-2018:1328", "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.9::el7", "impact": "low", "package": "cfme-gemset-0:5.9.2.4-1.el7cf", "product_name": "CloudForms Management Engine 5.9", "release_date": "2018-05-07T00:00:00Z"}, {"advisory": "RHSA-2018:1328", "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.9::el7", "impact": "low", "package": "dbus-api-service-0:1.0.1-3.el7cf", "product_name": "CloudForms Management Engine 5.9", "release_date": "2018-05-07T00:00:00Z"}, {"advisory": "RHSA-2018:1328", "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.9::el7", "impact": "low", "package": "httpd-configmap-generator-0:0.2.1-2.el7cf", "product_name": "CloudForms Management Engine 5.9", "release_date": "2018-05-07T00:00:00Z"}, {"advisory": "RHSA-2018:1328", "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.9::el7", "impact": "low", "package": "postgresql96-0:9.6.6-1PGDG.el7", "product_name": "CloudForms Management Engine 5.9", "release_date": "2018-05-07T00:00:00Z"}, {"advisory": "RHSA-2018:1328", "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.9::el7", "impact": "low", "package": "python-paramiko-0:2.1.1-4.el7", "product_name": "CloudForms Management Engine 5.9", "release_date": "2018-05-07T00:00:00Z"}, {"advisory": "RHSA-2018:1328", "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.9::el7", "impact": "low", "package": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf", "product_name": "CloudForms Management Engine 5.9", "release_date": "2018-05-07T00:00:00Z"}, {"advisory": "RHSA-2018:1328", "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.9::el7", "impact": "low", "package": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf", "product_name": "CloudForms Management Engine 5.9", "release_date": "2018-05-07T00:00:00Z"}, {"advisory": "RHSA-2018:1213", "cpe": "cpe:/a:redhat:ansible_engine:2.4::el7", "impact": "low", "package": "python-paramiko-0:2.1.1-4.el7", "product_name": "Red Hat Ansible Engine 2.4 for RHEL 7", "release_date": "2018-04-24T00:00:00Z"}, {"advisory": "RHSA-2018:0646", "cpe": "cpe:/a:redhat:ansible_engine:2::el7", "impact": "low", "package": "python-paramiko-0:2.1.1-4.el7", "product_name": "Red Hat Ansible Engine 2 for RHEL 7", "release_date": "2018-04-05T00:00:00Z"}, {"advisory": "RHSA-2018:1124", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "python-paramiko-0:1.7.5-4.el6_9", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2018-04-12T00:00:00Z"}, {"advisory": "RHSA-2018:1125", "cpe": "cpe:/o:redhat:rhel_aus:6.4", "package": "python-paramiko-0:1.7.5-4.el6_4", "product_name": "Red Hat Enterprise Linux 6.4 Advanced Update Support", "release_date": "2018-04-12T00:00:00Z"}, {"advisory": "RHSA-2018:1125", "cpe": "cpe:/o:redhat:rhel_aus:6.5", "package": "python-paramiko-0:1.7.5-4.el6_5", "product_name": "Red Hat Enterprise Linux 6.5 Advanced Update Support", "release_date": "2018-04-12T00:00:00Z"}, {"advisory": "RHSA-2018:1125", "cpe": "cpe:/o:redhat:rhel_aus:6.6", "package": "python-paramiko-0:1.7.5-4.el6_6", "product_name": "Red Hat Enterprise Linux 6.6 Advanced Update Support", "release_date": "2018-04-12T00:00:00Z"}, {"advisory": "RHSA-2018:1125", "cpe": "cpe:/o:redhat:rhel_tus:6.6", "package": "python-paramiko-0:1.7.5-4.el6_6", "product_name": "Red Hat Enterprise Linux 6.6 Telco Extended Update Support", "release_date": "2018-04-12T00:00:00Z"}, {"advisory": "RHSA-2018:1125", "cpe": "cpe:/o:redhat:rhel_eus:6.7", "package": "python-paramiko-0:1.7.5-4.el6_7", "product_name": "Red Hat Enterprise Linux 6.7 Extended Update Support", "release_date": "2018-04-12T00:00:00Z"}, {"advisory": "RHSA-2018:0591", "cpe": "cpe:/a:redhat:rhel_extras_other:7", "package": "python-paramiko-0:2.1.1-4.el7", "product_name": "Red Hat Enterprise Linux 7 Extras", "release_date": "2018-03-26T00:00:00Z"}, {"advisory": "RHSA-2018:1274", "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor", "impact": "low", "package": "python-paramiko-0:2.1.1-4.el7", "product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7", "release_date": "2018-05-02T00:00:00Z"}, {"advisory": "RHSA-2018:1525", "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor", "impact": "low", "package": "rhvm-appliance-0:4.2-20180504.0", "product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7", "release_date": "2018-05-15T00:00:00Z"}, {"advisory": "RHSA-2018:1274", "cpe": "cpe:/a:redhat:rhev_manager:4", "impact": "low", "package": "python-paramiko-0:2.1.1-4.el7", "product_name": "Red Hat Virtualization Engine 4.1", "release_date": "2018-05-02T00:00:00Z"}], "bugzilla": {"description": "python-paramiko: Authentication bypass in transport.py", "id": "1557130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130"}, "csaw": false, "cvss3": {"cvss3_base_score": "9.8", "cvss3_scoring_vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "status": "verified"}, "cwe": "CWE-287", "details": ["transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.", "It was found that when acting as an SSH server, paramiko did not properly check whether authentication is completed before processing other requests. A customized SSH client could use this to bypass authentication when accessing any resources controlled by paramiko."], "name": "CVE-2018-7750", "package_state": [{"cpe": "cpe:/a:redhat:ceph_storage:2", "fix_state": "Affected", "impact": "low", "package_name": "python-paramiko", "product_name": "Red Hat Ceph Storage 2"}, {"cpe": "cpe:/a:redhat:openstack:7", "fix_state": "Will not fix", "impact": "low", "package_name": "python-paramiko", "product_name": "Red Hat Enterprise Linux OpenStack Platform 7 (Kilo)"}, {"cpe": "cpe:/a:redhat:openshift:3", "fix_state": "Affected", "impact": "low", "package_name": "python-paramiko", "product_name": "Red Hat OpenShift Enterprise 3"}, {"cpe": "cpe:/a:redhat:openstack:10", "fix_state": "Will not fix", "impact": "low", "package_name": "python-paramiko", "product_name": "Red Hat OpenStack Platform 10 (Newton)"}, {"cpe": "cpe:/a:redhat:openstack:11", "fix_state": "Will not fix", "impact": "low", "package_name": "python-paramiko", "product_name": "Red Hat OpenStack Platform 11 (Ocata)"}, {"cpe": "cpe:/a:redhat:openstack:12", "fix_state": "Will not fix", "impact": "low", "package_name": "python-paramiko", "product_name": "Red Hat OpenStack Platform 12 (Pike)"}, {"cpe": "cpe:/a:redhat:openstack:13", "fix_state": "Affected", "impact": "low", "package_name": "python-paramiko", "product_name": "Red Hat OpenStack Platform 13 (Queens)"}, {"cpe": "cpe:/a:redhat:openstack:8", "fix_state": "Will not fix", "impact": "low", "package_name": "python-paramiko", "product_name": "Red Hat OpenStack Platform 8 (Liberty)"}, {"cpe": "cpe:/a:redhat:openstack:9", "fix_state": "Will not fix", "impact": "low", "package_name": "python-paramiko", "product_name": "Red Hat OpenStack Platform 9 (Mitaka)"}, {"cpe": "cpe:/a:redhat:qci:1.0::el7", "fix_state": "Will not fix", "package_name": "python-paramiko", "product_name": "Red Hat Quickstart Cloud Installer 1"}, {"cpe": "cpe:/a:redhat:satellite:6", "fix_state": "Out of support scope", "impact": "low", "package_name": "python-paramiko", "product_name": "Red Hat Satellite 6"}, {"cpe": "cpe:/a:redhat:storage:3", "fix_state": "Affected", "impact": "low", "package_name": "python-paramiko", "product_name": "Red Hat Storage 3"}, {"cpe": "cpe:/a:redhat:rhscon:2", "fix_state": "Will not fix", "impact": "low", "package_name": "python-paramiko", "product_name": "Red Hat Storage Console 2"}, {"cpe": "cpe:/a:redhat:rhui:3", "fix_state": "Will not fix", "package_name": "python-paramiko", "product_name": "Red Hat Update Infrastructure 3 for Cloud Providers"}], "public_date": "2018-03-13T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2018-7750\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-7750"], "statement": "This flaw is a user authentication bypass in the SSH Server functionality of paramiko (normally used by subclassing `paramiko.ServerInterface`). Where paramiko is used only for its client-side functionality (e.g. `paramiko.SSHClient`), the vulnerability is not exposed and thus cannot be exploited.\nThe following Red Hat products use paramiko only in client-side mode. Server side functionality is not used.\n* Red Hat Ceph Storage 2\n* Red Hat CloudForms 4\n* Red Hat Enterprise Linux 7\n* Red Hat Enterprise Virtualization\n* Red Hat Gluster Storage 3\n* Red Hat Openshift Container Platform\n* Red Hat Quick Cloud Installer\n* Red Hat Satellite 6\n* Red Hat Storage Console 2\n* Red Hat OpenStack Platform\n* Red Hat Update Infrastructure", "threat_severity": "Critical"}