Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-48867 | An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 3.0+ and could potentially enable unauthorized users to gain administrative access. |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Fri, 13 Jun 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhui
|
|
| CPEs | cpe:/a:redhat:rhui:4::el8 | |
| Vendors & Products |
Redhat rhui
|
Sun, 24 Nov 2024 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat satellite Maintenance
|
|
| CPEs | cpe:/a:redhat:satellite_maintenance:6.16::el8 cpe:/a:redhat:satellite_maintenance:6.16::el9 cpe:/a:redhat:satellite_utils:6.16::el8 cpe:/a:redhat:satellite_utils:6.16::el9 |
|
| Vendors & Products |
Redhat satellite Maintenance
|
|
| References |
|
Wed, 06 Nov 2024 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:satellite:6.16::el8 cpe:/a:redhat:satellite:6.16::el9 cpe:/a:redhat:satellite_capsule:6.16::el8 cpe:/a:redhat:satellite_capsule:6.16::el9 |
Wed, 18 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Thu, 05 Sep 2024 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:redhat:satellite:6.13:*:*:*:*:*:*:* cpe:2.3:a:redhat:satellite:6.14:*:*:*:*:*:*:* cpe:2.3:a:redhat:satellite:6.15:*:*:*:*:*:*:* |
|
| Metrics |
cvssV3_1
|
Wed, 04 Sep 2024 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat satellite Capsule
Redhat satellite Utils |
|
| CPEs | cpe:/a:redhat:satellite:6.13::el8 cpe:/a:redhat:satellite:6.14::el8 cpe:/a:redhat:satellite:6.15::el8 cpe:/a:redhat:satellite_capsule:6.13::el8 cpe:/a:redhat:satellite_capsule:6.14::el8 cpe:/a:redhat:satellite_capsule:6.15::el8 cpe:/a:redhat:satellite_utils:6.13::el8 cpe:/a:redhat:satellite_utils:6.14::el8 cpe:/a:redhat:satellite_utils:6.15::el8 |
|
| Vendors & Products |
Redhat satellite Capsule
Redhat satellite Utils |
|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 04 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Sep 2024 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authentication bypass vulnerability has been identified in Foreman when deployed with Gunicorn versions prior to 22.0, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 4.0+ and could potentially enable unauthorized users to gain administrative access. | An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 3.0+ and could potentially enable unauthorized users to gain administrative access. |
| Metrics |
cvssV3_0
|
cvssV3_0
|
Wed, 04 Sep 2024 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authentication bypass vulnerability has been identified in Foreman when deployed with Gunicorn versions prior to 22.0, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 4.0+ and could potentially enable unauthorized users to gain administrative access. | |
| Title | Puppet-pulpcore: an authentication bypass vulnerability exists in pulpcore | |
| First Time appeared |
Redhat
Redhat satellite |
|
| Weaknesses | CWE-287 | |
| CPEs | cpe:/a:redhat:satellite:6 | |
| Vendors & Products |
Redhat
Redhat satellite |
|
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-11T16:12:18.584Z
Reserved: 2024-08-19T12:40:08.047Z
Link: CVE-2024-7923
Updated: 2024-09-04T14:18:25.720Z
Status : Modified
Published: 2024-09-04T14:15:14.800
Modified: 2024-11-24T19:15:05.933
Link: CVE-2024-7923
OpenCVE Enrichment
No data.
EUVD