Theforeman Katello

CPE Details

Theforeman Katello
-
2019-12-12
11h49 +00:00
2019-12-12
11h49 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:theforeman:katello:-:*:*:*:*:*:*:*

Informations

Vendor

theforeman

Product

katello

Version

-

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2013-4120 2019-12-10 13h32 +00:00 Katello has a Denial of Service vulnerability in API OAuth authentication
7.5
Haute
CVE-2013-0283 2019-12-05 15h02 +00:00 Katello: Username in Notification page has cross site scripting
5.4
Moyen
CVE-2013-2101 2019-12-03 12h08 +00:00 Katello has multiple XSS issues in various entities
5.4
Moyen
CVE-2018-16887 2019-01-13 01h00 +00:00 A cross-site scripting (XSS) flaw was found in the katello component of Satellite. An attacker with privilege to create/edit organizations and locations is able to execute a XSS attacks against other users through the Subscriptions or the Red Hat Repositories wizards. This can possibly lead to malicious code execution and extraction of the anti-CSRF token of higher privileged users. Versions before 3.9.0 are vulnerable.
5.4
Moyen
CVE-2016-9595 2018-07-27 16h00 +00:00 A flaw was found in katello-debug before 3.4.0 where certain scripts and log files used insecure temporary files. A local user could exploit this flaw to conduct a symbolic-link attack, allowing them to overwrite the contents of arbitrary files.
7.3
Haute
CVE-2013-2143 2014-04-17 12h00 +00:00 The users controller in Katello 1.5.0-14 and earlier, and Red Hat Satellite, does not check authorization for the update_roles action, which allows remote authenticated users to gain privileges by setting a user account to an administrator account.
6.5
CVE-2012-3503 2012-08-25 08h00 +00:00 The installation script in Katello 1.0 and earlier does not properly generate the Application.config.secret_token value, which causes each default installation to have the same secret token, and allows remote attackers to authenticate to the CloudForms System Engine web interface as an arbitrary user by creating a cookie using the default secret_token.
9.8
Critique