Redhat

Satellite

225 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 3.33%
  • Veröffentlicht 14.05.2024 16:17:37
  • Zuletzt bearbeitet 21.11.2024 09:43:45

A vulnerability was found in Satellite. When running a remote execution job on a host, the host's SSH key is not being checked. When the key changes, the Satellite still connects it because it uses "-o StrictHostKeyChecking=no". This flaw can lead to...

  • EPSS 0.05%
  • Veröffentlicht 18.12.2023 14:15:09
  • Zuletzt bearbeitet 21.11.2024 08:34:50

An arithmetic overflow flaw was found in Satellite when creating a new personal access token. This flaw allows an attacker who uses this arithmetic overflow to create personal access tokens that are valid indefinitely, resulting in damage to the syst...

Exploit
  • EPSS 0.64%
  • Veröffentlicht 14.11.2023 23:15:12
  • Zuletzt bearbeitet 06.12.2024 11:15:07

A path traversal vulnerability exists in Ansible when extracting tarballs. An attacker could craft a malicious tarball so that when using the galaxy importer of Ansible Automation Hub, a symlink could be dropped on the disk, resulting in files being ...

Warnung Medienbericht Exploit
  • EPSS 94.36%
  • Veröffentlicht 10.10.2023 14:15:10
  • Zuletzt bearbeitet 07.11.2025 19:00:41

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

  • EPSS 0.12%
  • Veröffentlicht 04.10.2023 14:15:10
  • Zuletzt bearbeitet 21.11.2024 07:39:59

An improper access control flaw was found in Candlepin. An attacker can create data scoped under another customer/tenant, which can result in loss of confidentiality and availability for the affected customer/tenant.

  • EPSS 0.09%
  • Veröffentlicht 03.10.2023 15:15:40
  • Zuletzt bearbeitet 21.11.2024 08:36:11

A sensitive information exposure vulnerability was found in foreman. Contents of tomcat's server.xml file, which contain passwords to candlepin's keystore and truststore, were found to be world readable.

  • EPSS 0.18%
  • Veröffentlicht 22.09.2023 14:15:44
  • Zuletzt bearbeitet 21.11.2024 07:20:24

A command injection flaw was found in foreman. This flaw allows an authenticated user with admin privileges on the foreman instance to transpile commands through CoreOS and Fedora CoreOS configurations in templates, possibly resulting in arbitrary co...

  • EPSS 0.04%
  • Veröffentlicht 20.09.2023 14:15:12
  • Zuletzt bearbeitet 21.11.2024 07:36:35

An arbitrary code execution flaw was found in Foreman. This flaw allows an admin user to bypass safe mode in templates and execute arbitrary code on the underlying operating system.

  • EPSS 0.08%
  • Veröffentlicht 20.09.2023 14:15:12
  • Zuletzt bearbeitet 21.11.2024 07:37:13

An arbitrary code execution flaw was found in Foreman. This issue may allow an admin user to execute arbitrary code on the underlying operating system by setting global parameters with a YAML payload.

  • EPSS 0.23%
  • Veröffentlicht 12.09.2023 16:15:08
  • Zuletzt bearbeitet 21.11.2024 07:36:35

A stored Cross-site scripting vulnerability was found in foreman. The Comment section in the Hosts tab has incorrect filtering of user input data. As a result of the attack, an attacker with an existing account on the system can steal another user's ...