CVE-2024-7923

An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 3.0+ and could potentially enable unauthorized users to gain administrative access.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:satellite:6.13:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:6.14:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:6.15:*:*:*:*:*:*:*

History

05 Sep 2024, 21:38

Type Values Removed Values Added
First Time Redhat
Redhat satellite
CPE cpe:2.3:a:redhat:satellite:6.13:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:6.14:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:6.15:*:*:*:*:*:*:*
References () https://access.redhat.com/errata/RHSA-2024:6335 - () https://access.redhat.com/errata/RHSA-2024:6335 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:6336 - () https://access.redhat.com/errata/RHSA-2024:6336 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:6337 - () https://access.redhat.com/errata/RHSA-2024:6337 - Vendor Advisory
References () https://access.redhat.com/security/cve/CVE-2024-7923 - () https://access.redhat.com/security/cve/CVE-2024-7923 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2305718 - () https://bugzilla.redhat.com/show_bug.cgi?id=2305718 - Issue Tracking
Summary
  • (es) Se ha identificado una vulnerabilidad de omisión de autenticación en Pulpcore cuando se implementa con versiones de Gunicorn anteriores a la 22.0, debido a la configuración puppet-pulpcore. Este problema surge porque mod_proxy de Apache no anula los encabezados correctamente debido a las restricciones sobre los guiones bajos en los encabezados HTTP, lo que permite la autenticación a través de un encabezado mal formado. Esta falla afecta a todas las implementaciones de Satellite activas (6.13, 6.14 y 6.15) que utilizan la versión 3.0+ de Pulpcore y podría permitir que usuarios no autorizados obtengan acceso administrativo.

04 Sep 2024, 17:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:6335 -
  • () https://access.redhat.com/errata/RHSA-2024:6336 -
  • () https://access.redhat.com/errata/RHSA-2024:6337 -

04 Sep 2024, 15:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 4.2
v2 : unknown
v3 : 9.8
Summary (en) An authentication bypass vulnerability has been identified in Foreman when deployed with Gunicorn versions prior to 22.0, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 4.0+ and could potentially enable unauthorized users to gain administrative access. (en) An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 3.0+ and could potentially enable unauthorized users to gain administrative access.

04 Sep 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-04 14:15

Updated : 2024-09-05 21:38


NVD link : CVE-2024-7923

Mitre link : CVE-2024-7923

CVE.ORG link : CVE-2024-7923


JSON object : View

Products Affected

redhat

  • satellite
CWE
CWE-287

Improper Authentication