First published: Fri Dec 20 2024(Updated: )
A server-side request forgery exists in Satellite. When a PUT HTTP request is made to /http_proxies/test_connection, when supplied with the http_proxies variable set to localhost, the attacker can fetch the localhost banner.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Satellite with Embedded Oracle |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12840 is classified as a high severity vulnerability due to its potential exploitation for server-side request forgery.
To fix CVE-2024-12840, ensure you are running the latest patched version of Red Hat Satellite that addresses this vulnerability.
CVE-2024-12840 can be exploited by sending a PUT HTTP request to /http_proxies/test_connection with the http_proxies variable set to localhost.
CVE-2024-12840 affects Red Hat Satellite, specifically versions that do not have the mitigation applied.
CVE-2024-12840 can lead to unauthorized access to sensitive information from the localhost of the vulnerable server.