Theforeman

Katello

10 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.55%
  • Published 10.12.2019 15:15:11
  • Last modified 21.11.2024 01:54:55

Katello has a Denial of Service vulnerability in API OAuth authentication

Exploit
  • EPSS 0.26%
  • Published 05.12.2019 17:15:11
  • Last modified 21.11.2024 01:47:13

Katello: Username in Notification page has cross site scripting

Exploit
  • EPSS 0.26%
  • Published 03.12.2019 14:15:09
  • Last modified 21.11.2024 01:51:02

Katello has multiple XSS issues in various entities

  • EPSS 0.15%
  • Published 25.11.2019 16:15:13
  • Last modified 21.11.2024 04:27:26

A cleartext password storage issue was discovered in Katello, versions 3.x.x.x before katello 3.12.0.9. Registry credentials used during container image discovery were inadvertently logged without being masked. This flaw could expose the registry cre...

Exploit
  • EPSS 0.26%
  • Published 13.01.2019 02:29:00
  • Last modified 21.11.2024 03:53:32

A cross-site scripting (XSS) flaw was found in the katello component of Satellite. An attacker with privilege to create/edit organizations and locations is able to execute a XSS attacks against other users through the Subscriptions or the Red Hat Rep...

  • EPSS 0.25%
  • Published 14.12.2018 00:29:01
  • Last modified 21.11.2024 03:49:26

A SQL injection flaw was found in katello's errata-related API. An authenticated remote attacker can craft input data to force a malformed SQL query to the backend database, which will leak internal IDs. This is issue is related to an incomplete fix ...

  • EPSS 0.12%
  • Published 22.08.2018 16:29:01
  • Last modified 21.11.2024 03:23:55

A flaw was found in Foreman's katello plugin version 3.4.5. After setting a new role to allow restricted access on a repository with a filter (filter set on the Product Name), the filter is not respected when the actions are done via hammer using the...

  • EPSS 0.04%
  • Published 27.07.2018 18:29:00
  • Last modified 21.11.2024 03:01:28

A flaw was found in katello-debug before 3.4.0 where certain scripts and log files used insecure temporary files. A local user could exploit this flaw to conduct a symbolic-link attack, allowing them to overwrite the contents of arbitrary files.

Exploit
  • EPSS 63.43%
  • Published 17.04.2014 14:55:05
  • Last modified 12.04.2025 10:46:40

The users controller in Katello 1.5.0-14 and earlier, and Red Hat Satellite, does not check authorization for the update_roles action, which allows remote authenticated users to gain privileges by setting a user account to an administrator account.

  • EPSS 1.3%
  • Published 25.08.2012 10:29:52
  • Last modified 11.04.2025 00:51:21

The installation script in Katello 1.0 and earlier does not properly generate the Application.config.secret_token value, which causes each default installation to have the same secret token, and allows remote attackers to authenticate to the CloudFor...