Pulpcore Authentication Bypass Vulnerability Affects Satellite Deployments

CVE-2024-7923

9.8CRITICAL

Key Information

Vendor
Red Hat
Status
Red Hat Satellite 6.13 For Rhel 8
Red Hat Satellite 6.14 For Rhel 8
Red Hat Satellite 6.15 For Rhel 8
Vendor
CVE Published:
4 September 2024

Summary

An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 3.0+ and could potentially enable unauthorized users to gain administrative access.

Affected Version(s)

Red Hat Satellite 6.13 for RHEL 8 <= 1:3.5.2.8-1.el8sat

Red Hat Satellite 6.13 for RHEL 8 <= 1:3.5.2.8-1.el8sat

Red Hat Satellite 6.14 for RHEL 8 <= 1:3.7.0.8-1.el8sat

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

Collectors

NVD DatabaseMitre Database
.