Redhat

Satellite

229 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.22%
  • Veröffentlicht 04.09.2024 14:15:14
  • Zuletzt bearbeitet 06.11.2024 09:15:04

An authentication bypass vulnerability has been identified in Foreman when deployed with External Authentication, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restriction...

  • EPSS 0.4%
  • Veröffentlicht 04.09.2024 14:15:14
  • Zuletzt bearbeitet 24.11.2024 19:15:05

An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of r...

  • EPSS 0.05%
  • Veröffentlicht 05.06.2024 15:15:12
  • Zuletzt bearbeitet 21.11.2024 09:30:13

A flaw was found in foreman-installer when puppet-candlepin is invoked cpdb with the --password parameter. This issue leaks the password in the process list and allows an attacker to take advantage and obtain the password.

  • EPSS 0.08%
  • Veröffentlicht 05.06.2024 15:15:12
  • Zuletzt bearbeitet 21.11.2024 09:43:40

A flaw was found in the Katello plugin for Foreman, where it is possible to store malicious JavaScript code in the "Description" field of a user. This code can be executed when opening certain pages, for example, Host Collections.

  • EPSS 3.04%
  • Veröffentlicht 14.05.2024 16:17:37
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A vulnerability was found in Satellite. When running a remote execution job on a host, the host's SSH key is not being checked. When the key changes, the Satellite still connects it because it uses "-o StrictHostKeyChecking=no". This flaw can lead to...

  • EPSS 0.05%
  • Veröffentlicht 18.12.2023 14:15:09
  • Zuletzt bearbeitet 21.11.2024 08:34:50

An arithmetic overflow flaw was found in Satellite when creating a new personal access token. This flaw allows an attacker who uses this arithmetic overflow to create personal access tokens that are valid indefinitely, resulting in damage to the syst...

Exploit
  • EPSS 0.72%
  • Veröffentlicht 14.11.2023 23:15:12
  • Zuletzt bearbeitet 06.12.2024 11:15:07

A path traversal vulnerability exists in Ansible when extracting tarballs. An attacker could craft a malicious tarball so that when using the galaxy importer of Ansible Automation Hub, a symlink could be dropped on the disk, resulting in files being ...

Warnung Medienbericht Exploit
  • EPSS 94.4%
  • Veröffentlicht 10.10.2023 14:15:10
  • Zuletzt bearbeitet 12.05.2026 15:10:32

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

  • EPSS 0.12%
  • Veröffentlicht 04.10.2023 14:15:10
  • Zuletzt bearbeitet 21.11.2024 07:39:59

An improper access control flaw was found in Candlepin. An attacker can create data scoped under another customer/tenant, which can result in loss of confidentiality and availability for the affected customer/tenant.

  • EPSS 0.09%
  • Veröffentlicht 03.10.2023 15:15:40
  • Zuletzt bearbeitet 21.11.2024 08:36:11

A sensitive information exposure vulnerability was found in foreman. Contents of tomcat's server.xml file, which contain passwords to candlepin's keystore and truststore, were found to be world readable.