CVE-2019-10136

It was found that Spacewalk, all versions through 2.9, did not safely compute client token checksums. An attacker with a valid, but expired, authenticated set of headers could move some digits around, artificially extending the session validity without modifying the checksum.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
cpe:2.3:a:redhat:spacewalk:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:18

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/109029 - Third Party Advisory () http://www.securityfocus.com/bid/109029 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10136 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10136 - Issue Tracking, Vendor Advisory

Information

Published : 2019-07-02 20:15

Updated : 2024-11-21 04:18


NVD link : CVE-2019-10136

Mitre link : CVE-2019-10136

CVE.ORG link : CVE-2019-10136


JSON object : View

Products Affected

redhat

  • spacewalk
  • satellite
CWE
CWE-347

Improper Verification of Cryptographic Signature