Red Hat Satellite 6.13

CPE Details

Red Hat Satellite 6.13
6.13
2023-09-28
09h09 +00:00
2023-09-28
09h09 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:redhat:satellite:6.13:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

satellite

Version

6.13

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-7923 2024-09-04 13h41 +00:00 An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 3.0+ and could potentially enable unauthorized users to gain administrative access.
9.8
Critical
CVE-2024-7012 2024-09-04 13h41 +00:00 An authentication bypass vulnerability has been identified in Foreman when deployed with External Authentication, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) and could potentially enable unauthorized users to gain administrative access.
9.8
Critical
CVE-2023-0462 2023-09-20 13h40 +00:00 An arbitrary code execution flaw was found in Foreman. This issue may allow an admin user to execute arbitrary code on the underlying operating system by setting global parameters with a YAML payload.
9.1
Critical
CVE-2023-0118 2023-09-20 13h39 +00:00 An arbitrary code execution flaw was found in Foreman. This flaw allows an admin user to bypass safe mode in templates and execute arbitrary code on the underlying operating system.
9.1
Critical
CVE-2023-0119 2023-09-12 15h14 +00:00 A stored Cross-site scripting vulnerability was found in foreman. The Comment section in the Hosts tab has incorrect filtering of user input data. As a result of the attack, an attacker with an existing account on the system can steal another user's session, make requests on behalf of the user, and obtain user credentials.
5.4
Medium