Filtered by vendor Redhat
Subscriptions
Filtered by product Certification
Subscriptions
Total
9 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2019-3897 | 1 Redhat | 2 Certification, Enterprise Linux | 2024-11-21 | 5.3 Medium |
It has been discovered in redhat-certification that any unauthorized user may download any file under /var/www/rhcert, provided they know its name. Red Hat Certification 6 and 7 is vulnerable to this issue. | ||||
CVE-2018-10870 | 1 Redhat | 3 Certification, Certifications, Enterprise Linux | 2024-11-21 | N/A |
redhat-certification does not properly sanitize paths in rhcertStore.py:__saveResultsFile. A remote attacker could use this flaw to overwrite any file, potentially gaining remote code execution. | ||||
CVE-2018-10869 | 1 Redhat | 3 Certification, Certifications, Enterprise Linux | 2024-11-21 | N/A |
redhat-certification does not properly restrict files that can be download through the /download page. A remote attacker may download any file accessible by the user running httpd. | ||||
CVE-2018-10868 | 1 Redhat | 1 Certification | 2024-11-21 | 7.5 High |
redhat-certification 7 does not properly restrict the number of recursive definitions of entities in XML documents, allowing an unauthenticated user to run a "Billion Laugh Attack" by replying to XMLRPC methods when getting the status of an host. | ||||
CVE-2018-10867 | 1 Redhat | 1 Certification | 2024-11-21 | 9.1 Critical |
Files are accessible without restrictions from the /update/results page of redhat-certification 7 package, allowing an attacker to remove any file accessible by the apached user. | ||||
CVE-2018-10866 | 1 Redhat | 1 Certification | 2024-11-21 | 9.1 Critical |
It was discovered that the /configuration view of redhat-certification 7 does not perform an authorization check and it allows an unauthenticated user to remove a "system" file, that is an xml file with host related information, not belonging to him. | ||||
CVE-2018-10865 | 1 Redhat | 1 Certification | 2024-11-21 | 7.5 High |
It was discovered that the /configuration view of redhat-certification 7 does not perform an authorization check and it allows an unauthenticated user to call a "restart" RPC method on any host accessible by the system, even if not belonging to him. | ||||
CVE-2018-10864 | 1 Redhat | 3 Certification, Certifications, Linux | 2024-11-21 | N/A |
An uncontrolled resource consumption flaw has been discovered in redhat-certification in the way documents are loaded. A remote attacker may provide an existing but invalid XML file which would be opened and never closed, possibly producing a Denial of Service. | ||||
CVE-2018-10863 | 1 Redhat | 1 Certification | 2024-11-21 | 7.5 High |
It was discovered that redhat-certification 7 is not properly configured and it lists all files and directories in the /var/www/rhcert/store/transfer directory, through the /rhcert-transfer URL. An unauthorized attacker may use this flaw to gather sensible information. |
Page 1 of 1.