Latest redhat satellite Vulnerabilities

FortiOS & FortiProxy - CVE-2023-44487 - Rapid Reset HTTP/2 vulnerability
Microsoft Windows 11=21H2
Microsoft Windows 11=21H2
Microsoft Windows Server 2022
Microsoft Windows Server 2022
Microsoft Windows 11=22H2
Microsoft Windows 11=22H2
and 549 more
Ansible automation hub: insecure galaxy-importer tarfile extraction
pip/galaxy-importer<=0.4.16
Redhat Ansible Automation Platform=2.0
Redhat Satellite=6.0
Satellite: arithmetic overflow in satellite
Redhat Satellite<6.13
redhat/satellite<6.13
Foreman: world readable file containing secrets
Theforeman Foreman<3.8.0
Redhat Satellite=6.0
An improper access control flaw was found in Candlepin. An attacker can create data scoped under another customer/tenant, which can result in loss of confidentiality and availability for the affected ...
Candlepinproject Candlepin<4.3.7-3
Redhat Satellite=6.0
redhat/candlepin-4.3.7<3
redhat/candlepin-4.3.8<1
An arbitrary code execution flaw was found in Foreman. This issue may allow an admin user to execute arbitrary code on the underlying operating system by setting global parameters with a YAML payload.
Theforeman Foreman<3.8.0
Redhat Satellite>=6.0
An admin user on Foreman can bypass safe mode in templates and execute arbitrary code via the Report Templates function. When changing the "template" JSON value in the POST request, an attacker can ex...
Theforeman Foreman
Redhat Satellite>=6.13<6.13.3
Redhat Enterprise Linux=8.0
A stored Cross-site scripting vulnerability was found in foreman. The Comment section in the Hosts tab has incorrect filtering of user input data. As a result of the attack, an attacker with an existi...
redhat/foreman<0:3.5.1.17-1.el8
Redhat Satellite=6.13
Redhat Enterprise Linux=8.0
A blind site-to-site request forgery vulnerability was found in Satellite server. It is possible to trigger an external interaction to an attacker's server by modifying the Referer header in an HTTP r...
Redhat Satellite=6.9
Redhat Satellite=6.10
Redhat Satellite=6.11
A command injection flaw was found in foreman. This flaw allows an authenticated user with admin privileges on the foreman instance to transpile commands through CoreOS and Fedora CoreOS configuration...
rubygems/foreman<=3.8.0
Redhat Satellite=6.0
Theforeman Foreman
The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only.
Pulpproject Pulp Ansible
Redhat Ansible Automation Platform=2.0
Redhat Satellite=6.0
Redhat Update Infrastructure=3.0
IBM Java Security Components in IBM SDK, Java Technology Edition 8 before SR1 FP10, 7 R1 before SR3 FP10, 7 before SR9 FP10, 6 R1 before SR8 FP7, 6 before SR16 FP7, and 5.0 before SR16 FP13 stores pla...
Ibm Java Sdk>=5.0.0.0<5.0.16.13
Ibm Java Sdk>=6.0.0.0<6.0.16.7
Ibm Java Sdk>=6.1.0.0<6.1.8.7
Ibm Java Sdk>=7.0.0.0<7.0.9.10
Ibm Java Sdk>=7.1.0.0<7.1.3.10
Ibm Java Sdk>=8.0.0.0<8.0.1.10
and 24 more
In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from ...
redhat/logback-classic<1.2.9
redhat/candlepin<0:4.1.13-1.el7
redhat/candlepin<0:4.1.13-1.el8
Qos Logback<=1.2.7
Qos Logback=1.3.0-alpha0
Qos Logback=1.3.0-alpha1
and 14 more
In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.
redhat/django<3.2.10
redhat/django<3.1.14
redhat/django<2.2.25
redhat/python-django<0:3.2.13-1.el8
redhat/python-django<0:3.2.16-1.0.1.el8
Djangoproject Django>=2.2<2.2.25
and 9 more
An attacker with elevated privileges can utilize Ansible functions to carry out actions as the Foreman-proxy user on the system. The prerequisite for this is that the hosts must have already been adde...
Theforeman Foreman Ansible<7.1.0
Redhat Satellite=6.0
A credential leak vulnerability was found in Foreman through Azure Compute Profile. This flaw exposes the compute profile credentials to the all authenticated users with "view_compute_profiles" permis...
Theforeman Foreman>=1.6.0
Redhat Satellite=6.0
A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injectio...
Theforeman Foreman<2.4.1
Theforeman Foreman>=2.5.0<2.5.1
Theforeman Foreman=3.0.0-rc1
Theforeman Foreman=3.0.0-rc2
Redhat Satellite=6.0
A flaw was found in Red Hat Satellite. The BMC interface exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability ...
Redhat Satellite=6.0
A flaw was found in Red Hat Satellite in tfm-rubygem-foreman_azure_rm in versions before 2.2.0. A credential leak was identified which will expose Azure Resource Manager's secret key through JSON of t...
redhat/tfm-rubygem-foreman_azure_rm<2.2.0
Theforeman Foreman Azurerm<2.2.0
Redhat Satellite=6.0
Giving granular permission related to the organiztion with other permissions allowing a user to view and manage other organizations.
Redhat Satellite=6.7
An account takeover flaw was found in Red Hat Satellite 6.7.2 onward. A potential attacker with proper authentication to the relevant external authentication source (SSO or Open ID) can claim the priv...
redhat/candlepin<0:2.9.30-1.el7
redhat/foreman<0:1.24.1.32-1.el7
redhat/pulp-docker<0:3.2.7-1.el7
redhat/python-nectar<0:1.6.2-1.el7
redhat/satellite<0:6.7.5-1.el7
redhat/tfm-rubygem-katello<0:3.14.0.32-1.el7
and 278 more
Red Hat Satellite 6 allows local user of Smart-Proxy system to read OMAPI interface secret. Local user using the ISC DHCP server can read object mapping API (OMAPI) secret, as by default it listens on...
redhat/foreman<0:2.3.1.20-1.el7
Redhat Satellite=6.0
Red Hat Satellite 6 allows local user of instance to read cache files. These credentials give full access via the API and local user on the foreman server can gain complete access of the instance.
redhat/foreman<0:1.24.1.28-3.el7
redhat/ansible-collection-redhat-satellite<0:1.3.0-1.el7
redhat/ansiblerole-insights-client<0:1.7.1-1.el7
redhat/ansiblerole-satellite-receptor-installer<0:0.6.13-1.el7
redhat/ansible-runner<0:1.4.6-1.el7a
redhat/candlepin<0:3.1.21-1.el7
and 275 more
The "User input" entry from Job Invocation may contain plaintext password or other sensitive data. As a result, anyone who could view the job invocation could see it. The fix was to restrict the abil...
redhat/tfm-rubygem-foreman_ansible<4.0.3.4
Redhat Satellite=6.7
Redhat Satellite Capsule=6.7
Theforeman Foreman Ansible<4.0.3.4
A flaw was found in Hibernate Validator version 6.1.2.Final. A bug in the message interpolation processor enables invalid EL expressions to be evaluated as if they were valid. This flaw allows attacke...
redhat/eap7-dom4j<0:2.1.3-1.redhat_00001.1.el6ea
redhat/eap7-elytron-web<0:1.2.5-1.Final_redhat_00001.1.el6ea
redhat/eap7-glassfish-jsf<0:2.3.5-13.SP3_redhat_00011.1.el6ea
redhat/eap7-hal-console<0:3.0.23-1.Final_redhat_00001.1.el6ea
redhat/eap7-hibernate<0:5.3.17-1.Final_redhat_00001.1.el6ea
redhat/eap7-hibernate-validator<0:6.0.20-1.Final_redhat_00001.1.el6ea
and 394 more
Redhat Satellite=6.0
debian
rubygem-hammer_cli_foreman: File /etc/hammer/cli.modules.d/foreman.yml world readable
Theforeman Hammer Cli
Redhat Satellite=6.0
Katello has multiple XSS issues in various entities
Theforeman Katello
Redhat Satellite=6.0
rhn-proxy: may transmit credentials over clear-text when accessing RHN Satellite
Redhat Satellite<5.6
Nokogiri gem 1.5.x and 1.6.x has DoS while parsing XML entities by failing to apply limits
debian/ruby-nokogiri
Nokogiri Nokogiri>=1.5.0<1.5.11
Nokogiri Nokogiri>=1.6.0<1.6.1
Debian Debian Linux=8.0
Debian Debian Linux=9.0
Debian Debian Linux=10.0
and 6 more
Nokogiri gem 1.5.x has Denial of Service via infinite loop when parsing XML documents
debian/ruby-nokogiri
Nokogiri Nokogiri>=1.5.0<1.5.11
Nokogiri Nokogiri>=1.6.0<1.6.1
Debian Debian Linux=8.0
Debian Debian Linux=9.0
Debian Debian Linux=10.0
and 6 more
Eclipse OpenJ9 could allow a local attacker to gain elevated privileges on the system, caused by the failure to performs an authorization check when an actor attempts to access a resource or perform a...
Eclipse Openj9>=0.15.0<=0.16.0
Redhat Satellite=5.8
Redhat Enterprise Linux=8.0
Redhat Enterprise Linux Desktop=6.0
Redhat Enterprise Linux Desktop=7.0
Redhat Enterprise Linux Eus=8.1
and 7 more
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Deployment). The supported version that is affected is Java SE: 8u221; Java SE Embedded: 8u221. Difficult to exploi...
Oracle JDK=1.8.0-update221
Oracle JRE=1.8.0-update221
NetApp E-Series SANtricity OS Controller>=11.0.0<=11.50.2
Netapp E-series Santricity Storage Manager
IBM Cognos Controller 10.4.1
Netapp E-series Santricity Web Services Proxy
and 16 more
An unspecified vulnerability in Java SE related to the Networking component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown at...
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-1.el6_10
redhat/java<1.7.0-openjdk-1:1.7.0.241-2.6.20.0.el6_10
redhat/java<1.7.1-ibm-1:1.7.1.4.55-1jpp.1.el6_10
redhat/java<1.8.0-ibm-1:1.8.0.6.0-1jpp.1.el6_10
redhat/java<11-openjdk-1:11.0.5.10-0.el7_7
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-0.el7_7
and 53 more
An unspecified vulnerability in Java SE related to the 2D component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vec...
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-1.el6_10
redhat/java<1.7.0-openjdk-1:1.7.0.241-2.6.20.0.el6_10
redhat/java<1.7.1-ibm-1:1.7.1.4.55-1jpp.1.el6_10
redhat/java<1.8.0-ibm-1:1.8.0.6.0-1jpp.1.el6_10
redhat/java<11-openjdk-1:11.0.5.10-0.el7_7
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-0.el7_7
and 53 more
An unspecified vulnerability in Java SE related to the Serialization component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown...
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-1.el6_10
redhat/java<1.7.0-openjdk-1:1.7.0.241-2.6.20.0.el6_10
redhat/java<1.7.1-ibm-1:1.7.1.4.55-1jpp.1.el6_10
redhat/java<1.8.0-ibm-1:1.8.0.6.0-1jpp.1.el6_10
redhat/java<11-openjdk-1:11.0.5.10-0.el7_7
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-0.el7_7
and 53 more
An unspecified vulnerability in Java SE related to the 2D component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vec...
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-1.el6_10
redhat/java<1.7.0-openjdk-1:1.7.0.241-2.6.20.0.el6_10
redhat/java<1.7.1-ibm-1:1.7.1.4.55-1jpp.1.el6_10
redhat/java<1.8.0-ibm-1:1.8.0.6.0-1jpp.1.el6_10
redhat/java<11-openjdk-1:11.0.5.10-0.el7_7
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-0.el7_7
and 53 more
An unspecified vulnerability in Java SE related to the Networking component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown at...
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-1.el6_10
redhat/java<1.7.0-openjdk-1:1.7.0.241-2.6.20.0.el6_10
redhat/java<1.7.1-ibm-1:1.7.1.4.55-1jpp.1.el6_10
redhat/java<1.8.0-ibm-1:1.8.0.6.0-1jpp.1.el6_10
redhat/java<11-openjdk-1:11.0.5.10-0.el7_7
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-0.el7_7
and 55 more
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Diffic...
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-1.el6_10
redhat/java<1.7.0-openjdk-1:1.7.0.241-2.6.20.0.el6_10
redhat/java<1.7.1-ibm-1:1.7.1.4.55-1jpp.1.el6_10
redhat/java<1.8.0-ibm-1:1.8.0.6.0-1jpp.1.el6_10
redhat/java<11-openjdk-1:11.0.5.10-0.el7_7
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-0.el7_7
and 53 more
An unspecified vulnerability in Java SE related to the Javadoc component could allow an unauthenticated attacker to cause low confidentiality impact, low integrity impact, and no availability impact.
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-1.el6_10
redhat/java<1.7.0-openjdk-1:1.7.0.241-2.6.20.0.el6_10
redhat/java<1.7.1-ibm-1:1.7.1.4.55-1jpp.1.el6_10
redhat/java<1.8.0-ibm-1:1.8.0.6.0-1jpp.1.el6_10
redhat/java<11-openjdk-1:11.0.5.10-0.el7_7
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-0.el7_7
and 53 more
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Diff...
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-1.el6_10
redhat/java<1.7.0-openjdk-1:1.7.0.241-2.6.20.0.el6_10
redhat/java<1.7.1-ibm-1:1.7.1.4.55-1jpp.1.el6_10
redhat/java<1.8.0-ibm-1:1.8.0.6.0-1jpp.1.el6_10
redhat/java<11-openjdk-1:11.0.5.10-0.el7_7
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-0.el7_7
and 53 more
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Diff...
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-1.el6_10
redhat/java<1.7.0-openjdk-1:1.7.0.241-2.6.20.0.el6_10
redhat/java<1.7.1-ibm-1:1.7.1.4.55-1jpp.1.el6_10
redhat/java<1.8.0-ibm-1:1.8.0.6.0-1jpp.1.el6_10
redhat/java<11-openjdk-1:11.0.5.10-0.el7_7
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-0.el7_7
and 55 more
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Diffic...
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-1.el6_10
redhat/java<1.8.0-ibm-1:1.8.0.6.0-1jpp.1.el6_10
redhat/java<11-openjdk-1:11.0.5.10-0.el7_7
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-0.el7_7
redhat/java<1.8.0-ibm-1:1.8.0.6.0-1jpp.1.el7
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-0.el8_0
and 52 more
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u22...
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-1.el6_10
redhat/java<1.7.0-openjdk-1:1.7.0.241-2.6.20.0.el6_10
redhat/java<1.7.1-ibm-1:1.7.1.4.55-1jpp.1.el6_10
redhat/java<1.8.0-ibm-1:1.8.0.6.0-1jpp.1.el6_10
redhat/java<11-openjdk-1:11.0.5.10-0.el7_7
redhat/java<1.8.0-openjdk-1:1.8.0.232.b09-0.el7_7
and 52 more
All builds of Eclipse OpenJ9 prior to 0.15 contain a bug where the loop versioner may fail to privatize a value that is pulled out of the loop by versioning - for example if there is a condition that ...
Eclipse Openj9<0.15.0
Redhat Satellite=5.8
Redhat Enterprise Linux Desktop=6.0
Redhat Enterprise Linux Desktop=7.0
Redhat Enterprise Linux Server=6.0
Redhat Enterprise Linux Server=7.0
and 2 more
It was discovered that the implementation of the Throwable class in the Utilities component of OpenJDK did not sufficiently validate serial stream before deserializing suppressed exceptions. A specia...
Oracle JDK=1.7.0-update221
Oracle JDK=1.8.0-update211
Oracle JDK=1.8.0-update212
Oracle JDK=11.0.3
Oracle JDK=12.0.1
Oracle JRE=1.7.0-update221
and 37 more
It was discovered that the AccessController class implementation in the Security component of OpenJDK failed, in certain cases, to consider the current context and correctly restrict privileges based ...
Oracle JDK=1.8.0-update211
Oracle JDK=1.8.0-update212
Oracle JDK=11.0.3
Oracle JDK=12.0.1
Oracle JRE=1.8.0-update211
Oracle JRE=1.8.0-update212
and 27 more
An input validation flaw was found in the URL class implementation in the Networking component of OpenJDK. A URL class instance could have been created for a URL string containing invalid characters ...
Oracle JDK=1.7.0-update221
Oracle JDK=1.8.0-update211
Oracle JDK=1.8.0-update212
Oracle JDK=11.0.3
Oracle JDK=12.0.1
Oracle JRE=1.7.0-update221
and 37 more
It was discovered that the implementation of the Collections class in the Utilities component of OpenJDK did not limit the amount of memory allocated when creating object instance from a serialized fo...
Oracle JDK=1.7.0-update221
Oracle JDK=1.8.0-update211
Oracle JDK=1.8.0-update212
Oracle JDK=11.0.3
Oracle JDK=12.0.1
Oracle JRE=1.7.0-update221
and 37 more
An authentication bypass vulnerability was discovered in foreman-tasks before 0.15.7. Previously, commit tasks were searched through find_resource, which performed authorization checks. After the chan...
redhat/ansiblerole-insights-client<0:1.6-2.el7
redhat/ansible-runner<0:1.3.4-2.el7a
redhat/candlepin<0:2.6.9-1.el7
redhat/foreman<0:1.22.0.32-1.el7
redhat/foreman-bootloaders-redhat<0:201901011200-1.el7
redhat/foreman-installer<1:1.22.0.16-1.el7
and 269 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203