Redhat

Satellite

221 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Published 15.03.2025 06:35:52
  • Last modified 15.03.2025 07:15:34

A flaw was found in Foreman/Red Hat Satellite. Improper file permissions allow low-privileged OS users to monitor and access temporary files under /var/tmp, exposing sensitive command outputs, such as /etc/shadow. This issue can lead to information d...

  • EPSS 0.06%
  • Published 20.12.2024 16:15:23
  • Last modified 12.05.2025 21:15:46

Rejected reason: Red Hat Product Security has come to the conclusion that this CVE is not needed. The problem described was inteded behavior and therefore not a bug.

  • EPSS 0.66%
  • Published 04.09.2024 14:15:14
  • Last modified 06.11.2024 09:15:04

An authentication bypass vulnerability has been identified in Foreman when deployed with External Authentication, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restriction...

  • EPSS 0.46%
  • Published 04.09.2024 14:15:14
  • Last modified 24.11.2024 19:15:05

An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of r...

  • EPSS 0.04%
  • Published 05.06.2024 15:15:12
  • Last modified 21.11.2024 09:30:13

A flaw was found in foreman-installer when puppet-candlepin is invoked cpdb with the --password parameter. This issue leaks the password in the process list and allows an attacker to take advantage and obtain the password.

  • EPSS 0.08%
  • Published 05.06.2024 15:15:12
  • Last modified 21.11.2024 09:43:40

A flaw was found in the Katello plugin for Foreman, where it is possible to store malicious JavaScript code in the "Description" field of a user. This code can be executed when opening certain pages, for example, Host Collections.

  • EPSS 1.74%
  • Published 14.05.2024 16:17:37
  • Last modified 21.11.2024 09:43:45

A vulnerability was found in Satellite. When running a remote execution job on a host, the host's SSH key is not being checked. When the key changes, the Satellite still connects it because it uses "-o StrictHostKeyChecking=no". This flaw can lead to...

  • EPSS 0.05%
  • Published 18.12.2023 14:15:09
  • Last modified 21.11.2024 08:34:50

An arithmetic overflow flaw was found in Satellite when creating a new personal access token. This flaw allows an attacker who uses this arithmetic overflow to create personal access tokens that are valid indefinitely, resulting in damage to the syst...

Exploit
  • EPSS 0.42%
  • Published 14.11.2023 23:15:12
  • Last modified 06.12.2024 11:15:07

A path traversal vulnerability exists in Ansible when extracting tarballs. An attacker could craft a malicious tarball so that when using the galaxy importer of Ansible Automation Hub, a symlink could be dropped on the disk, resulting in files being ...

Warning Media report Exploit
  • EPSS 94.44%
  • Published 10.10.2023 14:15:10
  • Last modified 11.06.2025 17:29:54

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.