Red Hat Satellite 5.0

CPE Details

Red Hat Satellite 5.0
5.0
2022-02-03
15h06 +00:00
2022-02-03
15h26 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:redhat:satellite:5.0:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

satellite

Version

5.0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-4320 2023-12-18 13h43 +00:00 An arithmetic overflow flaw was found in Satellite when creating a new personal access token. This flaw allows an attacker who uses this arithmetic overflow to create personal access tokens that are valid indefinitely, resulting in damage to the system's integrity.
7.6
Haute
CVE-2012-5562 2019-12-02 17h12 +00:00 rhn-proxy: may transmit credentials over clear-text when accessing RHN Satellite
6.5
Moyen
CVE-2019-10137 2019-07-02 17h28 +00:00 A path traversal flaw was found in spacewalk-proxy, all versions through 2.9, in the way the proxy processes cached client tokens. A remote, unauthenticated attacker could use this flaw to test the existence of arbitrary files, if they have access to the proxy's filesystem, or can execute arbitrary code in the context of the httpd process.
9.8
Critique
CVE-2019-3845 2019-04-11 12h31 +00:00 A lack of access control was found in the message queues maintained by Satellite's QPID broker and used by katello-agent in versions before Satellite 6.2, Satellite 6.1 optional and Satellite Capsule 6.1. A malicious user authenticated to a host registered to Satellite (or Capsule) can use this flaw to access QMF methods to any host also registered to Satellite (or Capsule) and execute privileged commands.
8
Haute
CVE-2017-7513 2018-08-22 13h00 +00:00 It was found that Satellite 5 configured with SSL/TLS for the PostgreSQL backend failed to correctly validate X.509 server certificate host name fields. A man-in-the-middle attacker could use this flaw to spoof a PostgreSQL server using a specially crafted X.509 certificate.
5.4
Moyen
CVE-2017-7514 2018-07-30 11h00 +00:00 A cross-site scripting (XSS) flaw was found in how the failed action entry is processed in Red Hat Satellite before version 5.8.0. A user able to specify a failed action could exploit this flaw to perform XSS attacks against other Satellite users.
5.4
Moyen
CVE-2017-12175 2018-07-26 15h00 +00:00 Red Hat Satellite before 6.5 is vulnerable to a XSS in discovery rule when you are entering filter and you use autocomplete functionality.
5.4
Moyen
CVE-2017-7538 2018-07-26 13h00 +00:00 A cross-site scripting (XSS) flaw was found in how an organization name is displayed in Satellite 5, before 5.8. A user able to change an organization's name could exploit this flaw to perform XSS attacks against other Satellite users.
5.4
Moyen
CVE-2018-1077 2018-03-14 18h00 +00:00 Spacewalk 2.6 contains an API which has an XXE flaw allowing for the disclosure of potentially sensitive information from the server.
7.5
Haute
CVE-2014-8163 2017-08-28 17h00 +00:00 Directory traversal vulnerability in the XMLRPC interface in Red Hat Satellite 5.
6.5
Moyen
CVE-2013-4480 2013-11-15 17h16 +00:00 Red Hat Satellite 5.6 and earlier does not disable the web interface that is used to create the first user for a satellite, which allows remote attackers to create administrator accounts.
7.5
CVE-2008-2369 2008-08-14 18h00 +00:00 manzier.pxt in Red Hat Network Satellite Server before 5.1.1 has a hard-coded authentication key, which allows remote attackers to connect to the server and obtain sensitive information about user accounts and entitlements.
9.1
Critique