First published: Wed Nov 23 2022(Updated: )
A blind site-to-site request forgery vulnerability was found in Satellite server. It is possible to trigger an external interaction to an attacker's server by modifying the Referer header in an HTTP request of specific resources in the server.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Satellite | =6.9 | |
Redhat Satellite | =6.10 | |
Redhat Satellite | =6.11 | |
=6.9 | ||
=6.10 | ||
=6.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-4130.
The severity level of CVE-2022-4130 is medium with a severity value of 4.5.
Redhat Satellite versions 6.9, 6.10, and 6.11 are affected by CVE-2022-4130.
This vulnerability allows an attacker to trigger an external interaction to their server by modifying the Referer header in an HTTP request of specific resources in the server.
Yes, you can find more information about CVE-2022-4130 at this link: [https://bugzilla.redhat.com/show_bug.cgi?id=2145254](https://bugzilla.redhat.com/show_bug.cgi?id=2145254)