Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-7923

Опубликовано: 04 сент. 2024
Источник: redhat
CVSS3: 9.8
EPSS Низкий

Описание

An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 3.0+ and could potentially enable unauthorized users to gain administrative access.

Отчет

This vulnerability is rated as Critical severity because this flaw allows attackers to gain unauthorized administrative access. There is no threat to users of RHUI because there is no public access to Pulp by RHUI users.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Update Infrastructure 4 for Cloud Providerspulpcore-selinuxNot affected
Red Hat Update Infrastructure 4 for Cloud Providerspython-pulpcoreNot affected
Red Hat Update Infrastructure 4 for Cloud Providerspython-pulpcore-clientNot affected
Red Hat Satellite 6.13 for RHEL 8foreman-installerFixedRHSA-2024:633704.09.2024
Red Hat Satellite 6.13 for RHEL 8foreman-installerFixedRHSA-2024:633704.09.2024
Red Hat Satellite 6.14 for RHEL 8foreman-installerFixedRHSA-2024:633604.09.2024
Red Hat Satellite 6.14 for RHEL 8foreman-installerFixedRHSA-2024:633604.09.2024
Red Hat Satellite 6.15 for RHEL 8foreman-installerFixedRHSA-2024:633504.09.2024
Red Hat Satellite 6.15 for RHEL 8foreman-installerFixedRHSA-2024:633504.09.2024
Red Hat Satellite 6.16 for RHEL 8foreman-installerFixedRHSA-2024:890605.11.2024

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=2305718puppet-pulpcore: An authentication bypass vulnerability exists in pulpcore

EPSS

Процентиль: 58%
0.00367
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
больше 1 года назад

An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 3.0+ and could potentially enable unauthorized users to gain administrative access.

CVSS3: 9.8
redos
15 дней назад

Уязвимость foreman

CVSS3: 9.8
github
больше 1 года назад

An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 3.0+ and could potentially enable unauthorized users to gain administrative access.

CVSS3: 9.8
fstec
больше 1 года назад

Уязвимость компонента Pulpcore платформы для централизованного управления жизненным циклом продуктов Red Hat Satellite , связанная с недостатками процедуры аутентификации, позволяющая нарушителю обойти процесс аутентификации

EPSS

Процентиль: 58%
0.00367
Низкий

9.8 Critical

CVSS3