CVE Vulnerabilities

CVE-2024-7923

Improper Authentication

Published: Sep 04, 2024 | Modified: Nov 24, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
9.8 CRITICAL
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Ubuntu
root.io logo minimus.io logo echo.ai logo

An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apaches mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 3.0+ and could potentially enable unauthorized users to gain administrative access.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
SatelliteRedhat6.13 (including)6.13 (including)
SatelliteRedhat6.14 (including)6.14 (including)
SatelliteRedhat6.15 (including)6.15 (including)
Red Hat Satellite 6.13 for RHEL 8RedHatforeman-installer-1:3.5.2.8-1.el8sat*
Red Hat Satellite 6.13 for RHEL 8RedHatforeman-installer-1:3.5.2.8-1.el8sat*
Red Hat Satellite 6.14 for RHEL 8RedHatforeman-installer-1:3.7.0.8-1.el8sat*
Red Hat Satellite 6.14 for RHEL 8RedHatforeman-installer-1:3.7.0.8-1.el8sat*
Red Hat Satellite 6.15 for RHEL 8RedHatforeman-installer-1:3.9.3.4-1.el8sat*
Red Hat Satellite 6.15 for RHEL 8RedHatforeman-installer-1:3.9.3.4-1.el8sat*
Red Hat Satellite 6.16 for RHEL 8RedHatforeman-installer-1:3.12.0.1-1.el8sat*
Red Hat Satellite 6.16 for RHEL 8RedHatforeman-installer-1:3.12.0.1-1.el8sat*
Red Hat Satellite 6.16 for RHEL 9RedHatforeman-installer-1:3.12.0.1-1.el9sat*
Red Hat Satellite 6.16 for RHEL 9RedHatforeman-installer-1:3.12.0.1-1.el9sat*

Potential Mitigations

References