CVE Vulnerabilities

CVE-2024-7012

Improper Authentication

Published: Sep 04, 2024 | Modified: Nov 06, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
9.8 CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Ubuntu
root.io logo minimus.io logo echo.ai logo

An authentication bypass vulnerability has been identified in Foreman when deployed with External Authentication, due to the puppet-foreman configuration. This issue arises from Apaches mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) and could potentially enable unauthorized users to gain administrative access.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
SatelliteRedhat6.13 (including)6.13 (including)
SatelliteRedhat6.14 (including)6.14 (including)
SatelliteRedhat6.15 (including)6.15 (including)
Red Hat Satellite 6.13 for RHEL 8RedHatforeman-installer-1:3.5.2.8-1.el8sat*
Red Hat Satellite 6.13 for RHEL 8RedHatforeman-installer-1:3.5.2.8-1.el8sat*
Red Hat Satellite 6.14 for RHEL 8RedHatforeman-installer-1:3.7.0.8-1.el8sat*
Red Hat Satellite 6.14 for RHEL 8RedHatforeman-installer-1:3.7.0.8-1.el8sat*
Red Hat Satellite 6.15 for RHEL 8RedHatforeman-installer-1:3.9.3.4-1.el8sat*
Red Hat Satellite 6.15 for RHEL 8RedHatforeman-installer-1:3.9.3.4-1.el8sat*
Red Hat Satellite 6.16 for RHEL 8RedHatforeman-installer-1:3.12.0.1-1.el8sat*
Red Hat Satellite 6.16 for RHEL 8RedHatforeman-installer-1:3.12.0.1-1.el8sat*
Red Hat Satellite 6.16 for RHEL 9RedHatforeman-installer-1:3.12.0.1-1.el9sat*
Red Hat Satellite 6.16 for RHEL 9RedHatforeman-installer-1:3.12.0.1-1.el9sat*

Potential Mitigations

References