CVE Vulnerabilities

CVE-2024-7923

Improper Authentication

Published: Sep 04, 2024 | Modified: Nov 24, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
9.8 CRITICAL
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Ubuntu

An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apaches mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 3.0+ and could potentially enable unauthorized users to gain administrative access.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

Name Vendor Start Version End Version
Satellite Redhat 6.13 (including) 6.13 (including)
Satellite Redhat 6.14 (including) 6.14 (including)
Satellite Redhat 6.15 (including) 6.15 (including)
Red Hat Satellite 6.13 for RHEL 8 RedHat foreman-installer-1:3.5.2.8-1.el8sat *
Red Hat Satellite 6.13 for RHEL 8 RedHat foreman-installer-1:3.5.2.8-1.el8sat *
Red Hat Satellite 6.14 for RHEL 8 RedHat foreman-installer-1:3.7.0.8-1.el8sat *
Red Hat Satellite 6.14 for RHEL 8 RedHat foreman-installer-1:3.7.0.8-1.el8sat *
Red Hat Satellite 6.15 for RHEL 8 RedHat foreman-installer-1:3.9.3.4-1.el8sat *
Red Hat Satellite 6.15 for RHEL 8 RedHat foreman-installer-1:3.9.3.4-1.el8sat *
Red Hat Satellite 6.16 for RHEL 8 RedHat foreman-installer-1:3.12.0.1-1.el8sat *
Red Hat Satellite 6.16 for RHEL 8 RedHat foreman-installer-1:3.12.0.1-1.el8sat *
Red Hat Satellite 6.16 for RHEL 9 RedHat foreman-installer-1:3.12.0.1-1.el9sat *
Red Hat Satellite 6.16 for RHEL 9 RedHat foreman-installer-1:3.12.0.1-1.el9sat *

Potential Mitigations

References