Redhat

Certification

9 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.24%
  • Published 26.05.2021 19:15:08
  • Last modified 21.11.2024 03:42:10

It was discovered that redhat-certification 7 is not properly configured and it lists all files and directories in the /var/www/rhcert/store/transfer directory, through the /rhcert-transfer URL. An unauthorized attacker may use this flaw to gather se...

  • EPSS 0.98%
  • Published 26.05.2021 19:15:08
  • Last modified 21.11.2024 03:42:10

It was discovered that the /configuration view of redhat-certification 7 does not perform an authorization check and it allows an unauthenticated user to call a "restart" RPC method on any host accessible by the system, even if not belonging to him.

  • EPSS 0.93%
  • Published 26.05.2021 19:15:08
  • Last modified 21.11.2024 03:42:10

It was discovered that the /configuration view of redhat-certification 7 does not perform an authorization check and it allows an unauthenticated user to remove a "system" file, that is an xml file with host related information, not belonging to him.

  • EPSS 0.34%
  • Published 26.05.2021 19:15:08
  • Last modified 21.11.2024 03:42:10

Files are accessible without restrictions from the /update/results page of redhat-certification 7 package, allowing an attacker to remove any file accessible by the apached user.

  • EPSS 1.17%
  • Published 26.05.2021 19:15:08
  • Last modified 21.11.2024 03:42:10

redhat-certification 7 does not properly restrict the number of recursive definitions of entities in XML documents, allowing an unauthenticated user to run a "Billion Laugh Attack" by replying to XMLRPC methods when getting the status of an host.

  • EPSS 0.18%
  • Published 16.03.2021 22:15:11
  • Last modified 21.11.2024 04:42:49

It has been discovered in redhat-certification that any unauthorized user may download any file under /var/www/rhcert, provided they know its name. Red Hat Certification 6 and 7 is vulnerable to this issue.

  • EPSS 0.63%
  • Published 13.08.2018 17:29:00
  • Last modified 21.11.2024 03:42:10

An uncontrolled resource consumption flaw has been discovered in redhat-certification in the way documents are loaded. A remote attacker may provide an existing but invalid XML file which would be opened and never closed, possibly producing a Denial ...

  • EPSS 0.56%
  • Published 19.07.2018 22:29:00
  • Last modified 21.11.2024 03:42:10

redhat-certification does not properly restrict files that can be download through the /download page. A remote attacker may download any file accessible by the user running httpd.

  • EPSS 1.88%
  • Published 19.07.2018 22:29:00
  • Last modified 21.11.2024 03:42:11

redhat-certification does not properly sanitize paths in rhcertStore.py:__saveResultsFile. A remote attacker could use this flaw to overwrite any file, potentially gaining remote code execution.