First published: Mon Feb 17 2020(Updated: )
A flaw was found in Spacewalk up to version 2.9 where it was vulnerable to XML internal entity attacks via the /rpc/api endpoint. An unauthenticated remote attacker could use this flaw to retrieve the content of certain files and trigger a denial of service, or in certain circumstances, execute arbitrary code on the Spacewalk server.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Spacewalk | <2.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1693 is a vulnerability found in Spacewalk up to version 2.9 that is vulnerable to XML internal entity attacks.
CVE-2020-1693 has a severity rating of 9.8 (Critical).
CVE-2020-1693 allows an unauthenticated remote attacker to retrieve the content of certain files and trigger a denial of service, or in certain circumstances, execute arbitrary code.
To fix CVE-2020-1693, it is recommended to upgrade to a version of Spacewalk that is not affected by the vulnerability.
You can find more information on CVE-2020-1693 in the following references: [link1], [link2], [link3].