Metrics
Affected Vendors & Products
Sun, 24 Nov 2024 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat satellite Maintenance
|
|
CPEs | cpe:/a:redhat:satellite_maintenance:6.16::el8 cpe:/a:redhat:satellite_maintenance:6.16::el9 cpe:/a:redhat:satellite_utils:6.16::el8 cpe:/a:redhat:satellite_utils:6.16::el9 |
|
Vendors & Products |
Redhat satellite Maintenance
|
|
References |
|
Wed, 06 Nov 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:satellite:6.16::el8 cpe:/a:redhat:satellite:6.16::el9 cpe:/a:redhat:satellite_capsule:6.16::el8 cpe:/a:redhat:satellite_capsule:6.16::el9 |
Wed, 18 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
ssvc
|
Thu, 05 Sep 2024 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:redhat:satellite:6.13:*:*:*:*:*:*:* cpe:2.3:a:redhat:satellite:6.14:*:*:*:*:*:*:* cpe:2.3:a:redhat:satellite:6.15:*:*:*:*:*:*:* |
|
Metrics |
cvssV3_1
|
Wed, 04 Sep 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat satellite Capsule
Redhat satellite Utils |
|
CPEs | cpe:/a:redhat:satellite:6.13::el8 cpe:/a:redhat:satellite:6.14::el8 cpe:/a:redhat:satellite:6.15::el8 cpe:/a:redhat:satellite_capsule:6.13::el8 cpe:/a:redhat:satellite_capsule:6.14::el8 cpe:/a:redhat:satellite_capsule:6.15::el8 cpe:/a:redhat:satellite_utils:6.13::el8 cpe:/a:redhat:satellite_utils:6.14::el8 cpe:/a:redhat:satellite_utils:6.15::el8 |
|
Vendors & Products |
Redhat satellite Capsule
Redhat satellite Utils |
|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Wed, 04 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 04 Sep 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An authentication bypass vulnerability has been identified in Foreman when deployed with Gunicorn versions prior to 22.0, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 4.0+ and could potentially enable unauthorized users to gain administrative access. | An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 3.0+ and could potentially enable unauthorized users to gain administrative access. |
Metrics |
cvssV3_0
|
cvssV3_0
|
Wed, 04 Sep 2024 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An authentication bypass vulnerability has been identified in Foreman when deployed with Gunicorn versions prior to 22.0, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 4.0+ and could potentially enable unauthorized users to gain administrative access. | |
Title | Puppet-pulpcore: an authentication bypass vulnerability exists in pulpcore | |
First Time appeared |
Redhat
Redhat satellite |
|
Weaknesses | CWE-287 | |
CPEs | cpe:/a:redhat:satellite:6 | |
Vendors & Products |
Redhat
Redhat satellite |
|
References |
| |
Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: redhat
Published: 2024-09-04T13:41:48.872Z
Updated: 2024-11-24T18:51:01.155Z
Reserved: 2024-08-19T12:40:08.047Z
Link: CVE-2024-7923
Updated: 2024-09-04T14:18:25.720Z
Status : Modified
Published: 2024-09-04T14:15:14.800
Modified: 2024-11-24T19:15:05.933
Link: CVE-2024-7923