Red Hat Satellite 6.0

CPE Details

Red Hat Satellite 6.0
6.0
2018-11-01
12h19 +00:00
2018-11-01
12h19 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

satellite

Version

6.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-7700 2024-08-12 16h48 +00:00 A command injection flaw was found in the "Host Init Config" template in the Foreman application via the "Install Packages" field on the "Register Host" page. This flaw allows an attacker with the necessary privileges to inject arbitrary commands into the configuration, potentially allowing unauthorized command execution during host registration. Although this issue requires user interaction to execute injected commands, it poses a significant risk if an unsuspecting user runs the generated registration script.
6.5
Medium
CVE-2024-4812 2024-06-05 15h06 +00:00 A flaw was found in the Katello plugin for Foreman, where it is possible to store malicious JavaScript code in the "Description" field of a user. This code can be executed when opening certain pages, for example, Host Collections.
4.8
Medium
CVE-2024-3716 2024-06-05 15h05 +00:00 A flaw was found in foreman-installer when puppet-candlepin is invoked cpdb with the --password parameter. This issue leaks the password in the process list and allows an attacker to take advantage and obtain the password.
6.2
Medium
CVE-2023-4320 2023-12-18 13h43 +00:00 An arithmetic overflow flaw was found in Satellite when creating a new personal access token. This flaw allows an attacker who uses this arithmetic overflow to create personal access tokens that are valid indefinitely, resulting in damage to the system's integrity.
7.6
High
CVE-2023-5189 2023-11-14 22h57 +00:00 A path traversal vulnerability exists in Ansible when extracting tarballs. An attacker could craft a malicious tarball so that when using the galaxy importer of Ansible Automation Hub, a symlink could be dropped on the disk, resulting in files being overwritten.
6.5
Medium
CVE-2023-44487 2023-10-10 00h00 +00:00 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
7.5
High
CVE-2023-1832 2023-10-04 13h05 +00:00 An improper access control flaw was found in Candlepin. An attacker can create data scoped under another customer/tenant, which can result in loss of confidentiality and availability for the affected customer/tenant.
8.1
High
CVE-2023-4886 2023-10-03 14h24 +00:00 A sensitive information exposure vulnerability was found in foreman. Contents of tomcat's server.xml file, which contain passwords to candlepin's keystore and truststore, were found to be world readable.
6.7
Medium
CVE-2022-3874 2023-09-22 13h56 +00:00 A command injection flaw was found in foreman. This flaw allows an authenticated user with admin privileges on the foreman instance to transpile commands through CoreOS and Fedora CoreOS configurations in templates, possibly resulting in arbitrary command execution on the underlying operating system.
9.1
Critical
CVE-2023-0462 2023-09-20 13h40 +00:00 An arbitrary code execution flaw was found in Foreman. This issue may allow an admin user to execute arbitrary code on the underlying operating system by setting global parameters with a YAML payload.
9.1
Critical
CVE-2022-3644 2022-10-24 22h00 +00:00 The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only.
5.5
Medium
CVE-2021-3590 2022-08-22 12h48 +00:00 A flaw was found in Foreman project. A credential leak was identified which will expose Azure Compute Profile password through JSON of the API output. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
8.8
High
CVE-2021-3589 2022-03-23 18h46 +00:00 An authorization flaw was found in Foreman Ansible. An authenticated attacker with certain permissions to create and run Ansible jobs can access hosts through job templates. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
8
High
CVE-2021-42550 2021-12-15 23h00 +00:00 In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
6.6
Medium
CVE-2020-14371 2021-06-02 10h12 +00:00 A credential leak vulnerability was found in Red Hat Satellite. This flaw exposes the compute resources credentials through VMs that are running on these resources in Satellite.
6.5
Medium
CVE-2020-14335 2021-06-02 09h52 +00:00 A flaw was found in Red Hat Satellite, which allows a privileged attacker to read OMAPI secrets through the ISC DHCP of Smart-Proxy. This flaw allows an attacker to gain control of DHCP records from the network. The highest threat from this vulnerability is to system availability.
5.5
Medium
CVE-2021-3413 2021-04-08 20h06 +00:00 A flaw was found in Red Hat Satellite in tfm-rubygem-foreman_azure_rm in versions before 2.2.0. A credential leak was identified which will expose Azure Resource Manager's secret key through JSON of the API output. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
6.3
Medium
CVE-2021-20256 2021-02-23 21h31 +00:00 A flaw was found in Red Hat Satellite. The BMC interface exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
5.3
Medium
CVE-2020-14334 2020-07-31 10h41 +00:00 A flaw was found in Red Hat Satellite 6 which allows privileged attacker to read cache files. These cache credentials could help attacker to gain complete control of the Satellite instance.
8.8
High
CVE-2012-6685 2020-02-19 13h41 +00:00 Nokogiri before 1.5.4 is vulnerable to XXE attacks
7.5
High
CVE-2014-3590 2020-01-02 18h52 +00:00 Versions of Foreman as shipped with Red Hat Satellite 6 does not check for a correct CSRF token in the logout action. Therefore, an attacker can log out a user by having them view specially crafted content.
6.5
Medium
CVE-2014-0241 2019-12-13 11h58 +00:00 rubygem-hammer_cli_foreman: File /etc/hammer/cli.modules.d/foreman.yml world readable
5.5
Medium
CVE-2013-2101 2019-12-03 12h08 +00:00 Katello has multiple XSS issues in various entities
5.4
Medium
CVE-2013-6461 2019-11-05 13h07 +00:00 Nokogiri gem 1.5.x and 1.6.x has DoS while parsing XML entities by failing to apply limits
6.5
Medium
CVE-2013-6460 2019-11-05 13h02 +00:00 Nokogiri gem 1.5.x has Denial of Service via infinite loop when parsing XML documents
6.5
Medium
CVE-2014-8183 2019-08-01 11h38 +00:00 It was found that foreman, versions 1.x.x before 1.15.6, in Satellite 6 did not properly enforce access controls on certain resources. An attacker with access to the API and knowledge of the resource name can access resources in other organizations.
7.4
High
CVE-2019-3845 2019-04-11 12h31 +00:00 A lack of access control was found in the message queues maintained by Satellite's QPID broker and used by katello-agent in versions before Satellite 6.2, Satellite 6.1 optional and Satellite Capsule 6.1. A malicious user authenticated to a host registered to Satellite (or Capsule) can use this flaw to access QMF methods to any host also registered to Satellite (or Capsule) and execute privileged commands.
8
High
CVE-2019-3893 2019-04-09 13h17 +00:00 In Foreman it was discovered that the delete compute resource operation, when executed from the Foreman API, leads to the disclosure of the plaintext password or token for the affected compute resource. A malicious user with the "delete_compute_resource" permission can use this flaw to take control over compute resources managed by foreman. Versions before 1.20.3, 1.21.1, 1.22.0 are vulnerable.
4.9
Medium
CVE-2018-14666 2019-01-22 14h00 +00:00 An improper authorization flaw was found in the Smart Class feature of Foreman. An attacker can use it to change configuration of any host registered in Red Hat Satellite, independent of the organization the host belongs to. This flaw affects all Red Hat Satellite 6 versions.
7.2
High
CVE-2018-16887 2019-01-13 01h00 +00:00 A cross-site scripting (XSS) flaw was found in the katello component of Satellite. An attacker with privilege to create/edit organizations and locations is able to execute a XSS attacks against other users through the Subscriptions or the Red Hat Repositories wizards. This can possibly lead to malicious code execution and extraction of the anti-CSRF token of higher privileged users. Versions before 3.9.0 are vulnerable.
5.4
Medium
CVE-2017-12175 2018-07-26 15h00 +00:00 Red Hat Satellite before 6.5 is vulnerable to a XSS in discovery rule when you are entering filter and you use autocomplete functionality.
5.4
Medium
CVE-2016-9593 2018-04-16 12h00 +00:00 foreman-debug before version 1.15.0 is vulnerable to a flaw in foreman-debug's logging. An attacker with access to the foreman log file would be able to view passwords, allowing them to access those systems.
8.8
High
CVE-2017-15136 2018-02-27 21h00 +00:00 When registering and activating a new system with Red Hat Satellite 6 if the new systems hostname is then reset to the hostname of a previously registered system the previously registered system will lose access to updates including security updates.
2.7
Low
CVE-2014-8168 2017-08-28 13h00 +00:00 Red Hat Satellite 6 allows local users to access mongod and delete pulp_database.
6.1
Medium
CVE-2014-8180 2017-06-06 16h00 +00:00 MongoDB on Red Hat Satellite 6 allows local users to bypass authentication by logging in with an empty password and delete information which can cause a Denial of Service.
5.5
Medium