cvelist/2024/7xxx/CVE-2024-7923.json

95 lines
3.6 KiB
JSON
Raw Normal View History

2024-08-19 13:00:35 +00:00
{
2024-09-04 14:00:33 +00:00
"data_version": "4.0",
2024-08-19 13:00:35 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-7923",
2024-09-04 14:00:33 +00:00
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
2024-08-19 13:00:35 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-09-04 14:00:33 +00:00
"value": "An authentication bypass vulnerability has been identified in Foreman when deployed with Gunicorn versions prior to 22.0, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 4.0+ and could potentially enable unauthorized users to gain administrative access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Authentication",
"cweId": "CWE-287"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Satellite 6",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-7923",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2024-7923"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2305718",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2305718"
}
]
},
"work_around": [
{
"lang": "en",
"value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
2024-08-19 13:00:35 +00:00
}
]
}
}